This research provides a new method to study praise poetry that can be used as a course to teach English and Arabic to students in the College of Education. This research answers two questions: Is it possible to examine praise poetry as a tagmeme? Is this analysis of great help in teaching English and Arabic to students in the College of Education? The data that will be chosen for the purpose of analysis are two of Shakespeare's sonnets and two of AL Mulik's poems. The sonnets selected for this purpose are 17 and 18. AL Mulik's poems selected for the same purpose are 8 and 9. Each line in both English and Arabic data is numbered by the researcher herself. Then, those lines are grouped into sentences to facilitate the process of analysis. The researcher has relied on Pike and Pike (1977) model for the analysis. The study has reached that AL Mulik's poems and the sonnets are considered as tagmeme and that there is a connection between a AL Mulik's poems and the sonnets. The analysis conducted in this research can be of great help to teach students learning English and Arabic in the College of Education because it supplies them with a novice method of studying the texts to be learned.
Neuron-derived neurotrophic factor [NENF], a human plasma neurotrophic factor, also increases neurotrophic activity in conjunction with Parkinson's disease-related proteins in Neudesin. Although Neudesin (neuron-derived neurotrophic secreted protein) is a member of the membrane-associated progesterone receptor (MAPR) protein subclass, it is not evolutionary related to the other members of the same family. The expression of Neudesin is found in both brain and spinal cord from embryonic stages to adulthood, as w Neudesin levels in Parkinson's patients with osteoporosis disease and Parkinson's patients without osteoporosis disease, as well as the relationship between Neudesin levels, Anthropometric and Clinical Features (Age, Gender, BMI) and
... Show MoreIn this study, a bioadhesive dosage form of eoconazole nitrate for vaginal delivery was designed using a combination of bioadhesive polymers: Carbopol 941 p and sodium carboxymethylcellulose or methylcellulose in different ratios. The bioadhesive strength was evaluated by measuring the force required to detach the tablet from sheep vaginal mucosal membrane. It was found that the bioadhesive force was directly proportional to Carbopol 941 p content in the different formulae. The formulae were tested for their swelling behavior using agar gel plate method. The results showed that formulae containing a combination of Carbopol 941 p and sodium carboxymethylcellulose had greater swelling index
... Show Moreالخلاصة
يجمع المختصون أن ليس من نقد إلا وكان مُرحِّلا لنظرية لسانية إلى فضائه، فكان أثر اللسانيات السوسيرية، ومن ثم اللسانيات التوليدية التحويلية معروفا، ولم يكن هذا الأثر محدودا باللسانيين أو نقاد الأدب فحسب، بل امتد إلى الشعراء والجماليين أيضا. وفي هذا البحث سنتوقف عند أثر اللسانيات الوظيفية، وهو ما لم يتوقف عنده إلا قلة من المختصين. ولن نقف عند نقد الوظيفيين للشعر، بل سنقف عند نقدهم للرواية، بقراءة
... Show MoreThis study evaluated the structural changes of enamel treated by the Regenerate system and carbon dioxide (CO2) laser against acid challenge. Thirty human enamel slabs were prepared and assigned into three groups: Group I: untreated (control); Group II: treated with the Regenerate system; and Group III exposed to CO2 laser. All specimens were subjected to an acid challenge (pH 4.5–7.0) for 14 days. Specimens were evaluated and compared at 120 points using five Raman microspectroscopic peaks; the phosphate vibrations ν1, ν2, ν3, and ν4 at 960, 433, 1029, and 579 cm−1, respectively, and the carbonate at 1070 cm−1, followed by Vickers microhardness test. The ratio of carbonate to phosphate was correlated to the equivalent mic
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreRecently, there has been an increasing advancement in the communications technology, and due to the increment in using the cellphone applications in the diverse aspects of life, it became possible to automate home appliances, which is the desired goal from residences worldwide, since that provides lots of comfort by knowing that their appliances are working in their highest effi ciency whenever it is required without their knowledge, and it also allows them to control the devices when they are away from home, including turning them on or off whenever required. The design and implementation of this system is carried out by using the Global System of Mobile communications (GSM) technique to control the home appliances – In this work, an ele
... Show More
This research deals with what so called concept of The Human Model and how Iraqi Media concerns of this concept practically as it plays a key role in attracting readers, on the first hand. On the second, it is important to shed light on the scientific desire of the Iraqi Media and how it deals with this contemporary trend especially in editorial media.
The importance of the research stems from the fact that it alerts to a new stream of modern trends in journalistic writing, according to many modern Arab and foreign media studies; and to the importance of employing human modeling in dealing with facts, events, issues and problems in various editorial arts within their effective influence in concilia
... Show More