The notion of presupposition has been tackled by many linguists. They have found that the term ―presupposition” is being used in two different senses in the literature: semantic and pragmatic. As for semantic sense, Geurts (1999) has isolated some constrictions as sources of presupposition by making lists of presupposition triggers. Concerning the pragmatic sense Kennan (1971:89) uses the term pragmatic presupposition to refer to a class of pragmatic inferences which are, in fact, the relation between a speaker and the appropriateness of a sentence in the context. In spite of the fact that there are many researches that have been done in the field of presupposition but few of them in the field of short stories up to the researcher's knowledge therefore, the study of this story bridges this gap. It is hypothesized that Edgar Allen Poe has dealt in some way with triggers of presupposition to analyze Poe's short story "The Black cat". The researcher will adopt Geurts (1999) model of presupposition analysis to study these triggers. The analysis of this story has shown that Poe heavily depends on Definite descriptions have ranked first scoring one hundred ninety two occurance, this means that this trigger has effect on the story. The second trigger Non-restrictive clauses scored thirty nine and the third rank has been occupied by Adverbial clauses that reoccurred twenty two times in the studied example. The fourth rank has been for Comparative expression which occurred twelve times. The fifth rank is taken for iteratives which reoccurred six times. The sixth ranked are factice items are occurred four times. Counter factual conditional occurs twice. Counter factual verbs occurs twice, Cleft constructions, and Conventional items (1) but implicative verbs, change of state verbs, Verbs of judging, Wh-questions have no scored in the short story. This research comes to the conclusion that one of the problems in assessing the nature of presupposition in linguistics is that there is no one concept of presupposition, but several different triggers, all of which have been related to the word of presupposition
The purpose of this paper is to develop a hybrid conceptual model for building information modelling (BIM) adoption in facilities management (FM) through the integration of the technology task fit (TTF) and the unified theory of acceptance and use of technology (UTAUT) theories. The study also aims to identify the influence factors of BIM adoption and usage in FM and identify gaps in the existing literature and to provide a holistic picture of recent research in technology acceptance and adoption in the construction industry and FM sector.
Automation is one of the key systems in modern agriculture, providing potential solutions to the challenges related to the growing world population, demographic shifts, and economic situation. The present article aims to highlight the importance of precision agriculture (PA) and smart agriculture (SA) in increasing agricultural production and the importance of environmental protection in increasing production and reducing traditional production. For this purpose, different types of automation systems in the field of agricultural operations are discussed, as well as smart agriculture technologies including the Internet of Things (IoT), artificial intelligence (AI), machine learning (ML), big data analysis, in addition to agricultural robots,
... Show Morehe development of multidrug resistance in Gram-negative bacteria is a major problem faced antimicrobial therapy and management of infectious diseases. Too many resistance mechanisms were developed since the antimicrobial agents were produced and actually used. The mechanisms involved in antimicrobial agents' resistance are, modifying enzymes, alteration of the target site of antimicrobials and prevention of antimicrobials accumulation inside the bacterial cells. The latest is accomplished by two mechanisms: alteration of outer membrane permeability and efflux pumps. Efflux pumps are either chromosomal or plasmid-encoded although chromosomal encoded efflux pumps are common in Gram-negative bacteria. Resistance nodulation division (RND) efflu
... Show MoreNanofluids (dispersion of nanoparticles in a base fluid) have been suggested as promising agents in subsurface industries including enhanced oil recovery. Nanoparticles can easily pass through small pore throats in reservoirs formations; however, physicochemical interactions between nanoparticles and between nanoparticles and rocks can cause a significant retention of nanoparticles. This study investigated the transport, attach, and retention of silica nanoparticles in core plugs. The hydrophilic silica nanoparticles were injected into limestone core as nanofluid of different nanoparticles size (5 nm, and 20 nm), concentration (0.005 – 0.1 wt% SiO2), and base fluid salinity (0 – 3 wt% NaCl) at different temperatures (23, and 50 °C). D
... Show MoreAnkylosing spondylitis is a complex debilitating disease because its pathogenesis is not clear. This study aims at detecting some pathogenesis factors that lead to induce the disease. Chlamydia pneumoniae is one of these pathogenesis factors which acts as a triggering factor for the disease. The study groups included forty Iraqi Ankylosing spondylitis patients and forty healthy persons as a control group. Immunological and molecular examinations were done to detect Chlamydia. pneumoniae in AS group. The immunological results were performed by Enzyme-Linked Immunosorbent Assay (ELISA) to detect anti-IgG and anti-IgM antibodies of C. pneumoniae revealed that five of forty AS patients' samples (12.5%) were positive for anti-IgG and IgM C. pneu
... Show MoreWarfarin dosing is challenging due to a multitude of factors affecting its pharmacokinetics (PK) and pharmacodynamics (PD). A novel personalised dosing algorithm predicated on a warfarin PK/PD model and incorporating CYP2C9 and VKORC1 genotype information has been developed for children. The present prospective, observational study aimed to compare the model with conventional weight-based dosing. The study involved two groups of children post-cardiac surgery: Group 1 were warfarin naïve, in whom loading and maintenance doses were estimated using the model over a 6-month duration and compared to historical case-matched controls. Group 2 were already established on maintenance therapy a
Vulvovaginal candidiasis (VVC) is caused by Candida albicans affects a significant number of women during their reproductive ages. Th17 cells play a major role in coordinating the host defense in oropharyngeal candidiasis. In this study we investigated the involvement of the Th17 response in an animal model of vulvovaginal candidiasis (VVC). The present study aimed to shed light on detect concentration of the IL-17 of infected animal and control . A direct Enzyme Linked Immunosorbent Assay (ELISA) was used to quantify IL-17 concentrations in 30 infected animal with VVC and 10 control group. Rats were intravaginally inoculated with C.albicans, and vaginal lavage fluids, serum were evaluated for proinflammatory cytokine IL-17 The data
... Show MoreRheumatoid arthritis (RA) is a systematic autoimmune disorder with chronic inflammation changes of unknown etiology. Various synovial inflammatory and proliferative alterations may contribute to the cartilaginous tissues and invasive bony tissues, leading to destructive joints and malformed bones. This disease is mostly due to infective microorganisms or genetic susceptibility causing immune system disturbances through triggering both T-cells and B-cells. Furthermore, different immune cells may secret cytokines, which are responsible for some RA pathogenesis activity. From ninety individuals, serum sample was collected; thirty of them were normal and sixty cases were patients with RA attended a privet medical clin
... Show MoreIn this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show More