Pauses as pragmatic markers are considered important devices that help readers to gain a better and deeper understanding of certain texts as well as speech, promoting effectively language communication. They can help both the speaker and the hearer, due to the functions they have in a text. Their occurrence in speech has a value that they make it more understandable. In this regard, the present study aims to examine the forms and functions of pauses in literary texts, more specifically, in selected extracts from two dramas, namely, Pinter's The Homecoming and Baker's Circle Mirror Transformation and to compare how the two writers use pauses in these two dramas. To do so, the sequential production approach of turn-taking by Sacks, Schegloff and Jefferson (1974), in combination with the contributions of some scholars who state the multifunctional use of pauses, has been used. The findings of the present study show that pauses do not exist arbitrarily in speech, but they are found to serve certain functions depending on the context in which they occur. Pauses, whether silent or filled have certain references. They are not merely meaningless. Pauses can express what is going on inside the characters without even saying a word. Regarding the selected extract from each play, it is noticed from the comparison that the two writers employ pauses frequently. Pauses are used by the two writers to be informative and that is why they should be studied with great care as they affect the interpretation of a certain text and consequently affect understanding
Breast cancer is the most common cause of death among women worldwide (1)
. Breast self-exam (BSE) is considered
an important public health procedure; primary prevention should be given the highest priority in the fight against
cancer.
Cancer is considered the second leading cause of death in developed countries there was some 6.2 million cancer
related deaths, accounƟng for 12% of all deaths globally (5).Patients perception toward this disease and preference
concerning the types and aims of their treatment are vary they may loss hopes and become devastated and crippled
or even dies earlier, if told about the diagnosis (13). The study aimed to assess knowledge of female students regarding
BSE, and to find out rel
This work is licensed under a Creative Commons Attribution 4.0 International License. Abstract This study examines the working capital management
In this work, satellite images classification for Al Chabaish marshes and the area surrounding district in (Dhi Qar) province for years 1990,2000 and 2015 using two software programming (MATLAB 7.11 and ERDAS imagine 2014) is presented. Proposed supervised classification method (Modified Vector Quantization) using MATLAB software and supervised classification method (Maximum likelihood Classifier) using ERDAS imagine have been used, in order to get most accurate results and compare these methods. The changes that taken place in year 2000 comparing with 1990 and in year 2015 comparing with 2000 are calculated. The results from classification indicated that water and vegetation are decreased, while barren land, alluvial soil and shallow water
... Show MoreThis article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec
... Show MoreThe adequacy of diagnostic tests, together with trichomoniasis associated clinical symptoms, were investigated in females suffering vaginitis, and they were referred to the Gynecology Department, Al-Yarmouk Teaching Hospital during the period December 2004 – June 2005. The total number of patients was 250 cases (age range: 18 - 52 years), and each patient was examined using a sterile speculum to obtain vaginal swabs for examination. The diagnosis with T. vaginalis was done in many methods. The direct methods included wet and stained (Leishman's stain) examinations and cultivation in different culture media (Kupferberg Trichomonas Broth Base;, Trichomonas Agar Base; TAB and Trichomonas Modified CPLM), while the indirect methods were serol
... Show MoreThe current world is observing huge developments in presenting the opportunity for organizations and administrative units to use information and communication technology and their adoption by administrative work due to its importance in the achievement of work with higher efficiency, speed, and facility of communication with all individuals and companies using various means of communication Depending on the Internet networks. Therefore, the research dealt with the study of electronic systems designed and adopted in the creation or construction of a database for archiving data, which is the main method in organizations and administrative units in developed countries. Where this system works to convert documents, and manual processes and t
... Show MoreAkaike’s Information Criterion (AIC) is a popular method for estimation the number of sources impinging on an array of sensors, which is a problem of great interest in several applications. The performance of AIC degrades under low Signal-to-Noise Ratio (SNR). This paper is concerned with the development and application of quadrature mirror filters (QMF) for improving the performance of AIC. A new system is proposed to estimate the number of sources by applying AIC to the outputs of filter bank consisting quadrature mirror filters (QMF). The proposed system can estimate the number of sources under low signal-to-noise ratio (SNR).
Abstract
The objective of this study was to investigate the phytochemical constituents of two different parts of Vigna radiata (seeds and sprouts), and identify their anti angiogenic activity .the goal was achieved by Preliminary qualitative phytochemical screening for crude ethanolic extract of two parts of plant
; rat aorta anti-angiogenesis assay had been conducted for both extracts . isolation , separation and purification of some phytochemical constituents that belong to important groups (flavonoids) from n-butanol fraction extract of Vigna radiata plant had been done in pure form by using preparative thin layer chromatography ( PTLC ) and then
... Show MoreIn this work, the surface of the telescope’s mirror is cleaned using an atmospheric-pressure radio frequency plasma jet (APRFPJ), which is generated by Argon gas between two coaxial metal electrodes. The RF power supply is set to 2 MHz frequencies with three different power levels: 20, 50, and 80 W. Carbon, that has adhered to the surface, can be effectively removed using the plasma cleaning technique, which also modifies any residual bonds. The cleaned surface was clearly distinguished using an optical emission spectroscopy (OES) technique and a water contact angle (WCA) analyzer for the activation property on their surfaces. The sample showed a super hydrophilic surface at an angle of 1° after 2.5 minutes of plasma tre
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show More