Preferred Language
Articles
/
AhfCnI8BVTCNdQwCn3zc
Constructing Carcinogen Risk in Scientific Discourse Through Ideological Conflict: A Cognitive Pragmatic Analysis
...Show More Authors

With the increasing rates of cancer worldwide, a great deal of scientific discourse is devoted to arguments and statements about cancer and its causes. Scientists from different fields try to seize any available chance to warn people of the risk of consuming and exposing to carcinogens that have, unfortunately, become essential parts of modern life. The present paper attempts to investigate the proximization strategy through which scientists construct carcinogen risk to enhance people’s preventive actions against these carcinogens. The paper targets the construction which depends on producing the conflict between the values of the people themselves and the contrasting values assigned to carcinogens. To achieve this aim, Cap’s (2013) cognitive pragmatic theory of proximization is employed for analysis. The theory is a component of three proximization strategies: spatial, temporal and axiological. Of these three proximization strategies, axiological proximization strategy is applied to a corpus from scientific discourse.  To arrive at more objective results, the analysis procedure is both qualitative and quantitative. Mathematical calculations are performed through corpus linguistics using Anthony’s AntConc (2019) corpus linguistics software. Eventually, the paper has arrive at certain conclusions that reveal the way actors (producers of scientific discourse) utilize axiological proximization strategy to portray carcinogen risk as a means for promoting people to take preventive measures.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
The Impact of Operating System on Bandwidth in Open VPN Technology
...Show More Authors

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 02 2023
Journal Name
Journal Of Survey In Fisheries Sciences
Evaluation of the Serum Asprosin Levels in Patients with Double Diabetes
...Show More Authors

Background : Double diabetes (DD) is the term used to describe situations in which a patient exhibits characteristics that are a combination of type 1 diabetes mellitus(T1DM) and type 2 Diabetes Mellitus (T2DM) a large epidemiological study found that 25.5% of people with T1D also had the metabolic syndrome. A new protein hormone called asprosin is predominantly released by white adipose tissue. It was initially discovered in 2016 . Asprosin is important diagnoses marker for insulin resistant in diabetes patients ,additionally is very important denotation about early diagnoses of type 2 diabetes. Objectives: The current study aims to find predictive significance of diagnosis a double diabetes by evaluating the asprosin in the blood serum of

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Swift Journal Of Social Sciences And Humanity
Difficulties encountered in translating Some legal texts from Arabic into English
...Show More Authors

Translation is both a social and cultural phenomenon, it can neither exist outside a social community and it is within society, nor it can be viewed as a medium of cross-cultural fertilization. This paper aims to investigate the difficulties that a translator may face when dealing with legal texts such as marriage and divorce contracts. These difficulties can be classified according to the present paper into syntactic, semantic, and cultural. The syntactic difficulties include word order, syntactic arrangement, unusual sentence structure, the use of model verbs in English, and difference in legal system. As to the semantic difficulties, they involve lack of established terminology, finding functional and lexical equivalence, word for word t

... Show More
Preview PDF
Publication Date
Fri Jan 10 2020
Journal Name
International Journal Of Pharmaceutical Research
Molecular Interaction in Aqueous Solution of Butanol Isomers at 298.15 K
...Show More Authors

Viscosity (η) of solutions of 1-butanol, sec-butanol, isobutanol and tert-butanol were investigated in aqueous solution structures of ranged composition from 0.55 to 1 mol.dm-3 at 298.15 K. The data of (η/η˳) were evaluated based on reduced Jone - Dole equation; η/η˳ =BC+1. In the term of B value, the consequences based on solute-solvent interaction in aqueous solutions of alcohols were deliberated. The outcomes of this paper discloses that alcohols act as structure producers in the water. Additionally, it has shown that solute-solvent with interacting activity of identical magnitude is in water-alcohol system

Publication Date
Fri Dec 15 2023
Journal Name
Al-adab Journal
The Portrayal of Serial Killers in Thomas Harris’ Novel Read Dragon
...Show More Authors

This study aims to deeply analyze the character of serial killers in Thomas Harris’ novels and focuses on his novel Red Dragon. The Study searches in these complex and deep characters through the use of Erich Fromm's concepts about the destructive nature of the human psyche and what are the factors affecting serial killers in all social psychological, and biological aspects. This study Concluded: Thomas Harris portrayed the characters of serial killers in a professional and complex and made the reader go on a contemplative journey in the mind and soul of the serial killer, thus reaching the climax of artistic perfection.

View Publication
Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Fat Mass and Obesity Association gene Polymorphism in PCOS Iraqi Women
...Show More Authors

             Polycystic syndrome (PCOS) is a considerable infertility disorder in adolescents and adult women in reproductive age. Obesity is a vigorous risk factor related to POCS.  This study aims to evaluate the association of obesity and PCOS by investigating several parameters including:  anthropological, biochemical (lipid profile, fasting blood sugar, glucose tolerance test, and hormone levels (LH, FSH, LH/FSH ratio, Estradiol2 and Testosterone),and genetic parameters (Fat mass and Obesity associated gene (FTO) polymorphism at rs17817449) in 63 obese and non-obese PCOS women. The biochemical tests were investigated by colorimetric methods while FTO gene polymorphism was detected by PCR–RFLP.  Lipid profile, F

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Mar 12 2021
Journal Name
Medico Legal Update
Association between ABO Blood Group and Radiographic Findings in Periodontal Disease
...Show More Authors

ZM Al-Bahrani, Medico Legal Update, 2021

View Publication
Publication Date
Tue Jan 17 2012
Journal Name
Journal Of The College Of Basic Education
Image Retrieval Using DCT/KWT and D4/KWT in Distributed System
...Show More Authors

This paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff

... Show More
Preview PDF
Publication Date
Thu Dec 31 2020
Journal Name
Journal Of New Theory
Brief review of soft sets and its application in coding theory
...Show More Authors

In this paper, we will focus to one of the recent applications of PU-algebras in the coding theory, namely the construction of codes by soft sets PU-valued functions. First, we shall introduce the notion of soft sets PU-valued functions on PU-algebra and investigate some of its related properties.Moreover, the codes generated by a soft sets PU-valued function are constructed and several examples are given. Furthermore, example with graphs of binary block code constructed from a soft sets PU-valued function is constructed.

Publication Date
Tue Jan 01 2002
Journal Name
University Of Baghdad
theoretical study of the drift velocity of electron in sf6-n2
...Show More Authors