Language as a means of communication has long been the concern of many conversation analysts in their studies such as: Sacks et al. (1974), Schegloff et al. (1977), Duncan (1972), Grice (1975) and Burton (1980). Burton has attempted analyzing the first ten transitions of the play “The Dumb Waiter” for mere a presentation of her approach. This paper aims at analyzing the conversational structure of forum on the subject of literary fiction and genre fiction by applying Burton’s model (1980) of analysis to answer the question to what extent this model is applicable in analyzing the presented text. The findings of the investigation have proved the applicability of the structure of conversation formulated by Burton (1980) in her model without modification.
Some new norms need to be adapted due to COVID-19 pandemic period where people need to wear masks, wash their hands frequently, maintain social distancing, and avoid going out unless necessary. Therefore, educational institutions were closed to minimize the spread of COVID-19. As a result of this, online education was adapted to substitute face-to-face learning. Therefore, this study aimed to assess the Malaysian university students’ adaptation to the new norms, knowledge and practices toward COVID-19, besides, their attitudes toward online learning. A convenient sampling technique was used to recruit 500 Malaysian university students from January to February 2021 through social media. For data collection, all students
... Show MoreBackground: The objective of this study was to investigate the possibility of standardizing the Bolton ratio analysis as a diagnostic measure for both Iraqi and Egyptian orthodontic populations within three Angle' classification groups. Materials and methods: Two hundred forty pretreatment study casts (one hundred twenty of each population) were included in this study and divided into three Angle' classification groups. The mesiodistal crown diameters of all teeth were measured for computing the anterior and total Bolton ratios. Analysis of variance was performed to compare the mean ratios of Bolton analysis as a function of the Angle classification.HSD test was used to specify the classes of malocclusion that have significant differences.
... Show MoreCompression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio fil
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
The present work reports the performance of three types of polyethersulfone (PES) membrane in the removal of highly polluting and toxic lead Pb2+ and cadmium Cd2+ ions from a single salt. This study investigated the effect of operating variables, including pH, types of PES membrane, and feed concentration, on the separation process. The transport parameters and mass transfer coefficient (k) of the membranes were estimated using the combined film theory-solution-diffusion (CFSD), combined film theory-Spiegler-Kedem (CFSK), and combined film theory-finely-porous (CFFP) membrane transport models. Various parameters were used to estimate the enrichment factors, concentration polarization modulus, and Péclet number. The pH values signif
... Show MoreThis research aimed at identifying the factors that affecting in the recruitment of a teaching staff for the Massive Open Online Courses (MOOCs) in university teaching at the University of Khartoum. The descriptive method was followed. The questionnaire was used as a tool for data collection,, which was distributed directly to a sample of (181) respondent of the teaching staff members of the senate at University of Khartoum from those who were attend at the senate meeting No. (409) which was held on 22 August 2016 Of (272). The researcher followed for the distribution the chance method, where each questionnaire was distributed to each of a teaching staff from different faculties at the University of Khartoum, according to his willingness
... Show MoreThe research aims to identify the requirements of banking Entrepreneurial in Saudi Arabia and Singapore, where banking Entrepreneurial is an important way to lead employees to acquire the experience and knowledge required by the banking environment, so we note the pursuit of the banking management to acquire new technology proactively and distinctively to compete with others through the introduction of modern technologies that help senior management to develop new banking methods adaptable to the surrounding environmental changes. The problem of research highlights the extent to which the requirements of banking Entrepreneurial are applied in Saudi Arabia and the Republic of Singapore and will be addressed through three investigation
... Show MoreThe main goal of this paper is to introduce and study a new concept named d*-supplemented which can be considered as a generalization of W- supplemented modules and d-hollow module. Also, we introduce a d*-supplement submodule. Many relationships of d*-supplemented modules are studied. Especially, we give characterizations of d*-supplemented modules and relationship between this kind of modules and other kind modules for example every d-hollow (d-local) module is d*-supplemented and by an example we show that the converse is not true.
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show More