With the increasing rates of cancer worldwide, a great deal of scientific discourse is devoted to arguments and statements about cancer and its causes. Scientists from different fields try to seize any available chance to warn people of the risk of consuming and exposing to carcinogens that have, unfortunately, become essential parts of modern life. The present paper attempts to investigate the proximization strategy through which scientists construct carcinogen risk to enhance people’s preventive actions against these carcinogens. The paper targets the construction which depends on producing the conflict between the values of the people themselves and the contrasting values assigned to carcinogens. To achieve this aim, Cap’s (2013) cognitive pragmatic theory of proximization is employed for analysis. The theory is a component of three proximization strategies: spatial, temporal and axiological. Of these three proximization strategies, axiological proximization strategy is applied to a corpus from scientific discourse. To arrive at more objective results, the analysis procedure is both qualitative and quantitative. Mathematical calculations are performed through corpus linguistics using Anthony’s AntConc (2019) corpus linguistics software. Eventually, the paper has arrive at certain conclusions that reveal the way actors (producers of scientific discourse) utilize axiological proximization strategy to portray carcinogen risk as a means for promoting people to take preventive measures.
The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show MoreBackground : Double diabetes (DD) is the term used to describe situations in which a patient exhibits characteristics that are a combination of type 1 diabetes mellitus(T1DM) and type 2 Diabetes Mellitus (T2DM) a large epidemiological study found that 25.5% of people with T1D also had the metabolic syndrome. A new protein hormone called asprosin is predominantly released by white adipose tissue. It was initially discovered in 2016 . Asprosin is important diagnoses marker for insulin resistant in diabetes patients ,additionally is very important denotation about early diagnoses of type 2 diabetes. Objectives: The current study aims to find predictive significance of diagnosis a double diabetes by evaluating the asprosin in the blood serum of
... Show MoreTranslation is both a social and cultural phenomenon, it can neither exist outside a social community and it is within society, nor it can be viewed as a medium of cross-cultural fertilization. This paper aims to investigate the difficulties that a translator may face when dealing with legal texts such as marriage and divorce contracts. These difficulties can be classified according to the present paper into syntactic, semantic, and cultural. The syntactic difficulties include word order, syntactic arrangement, unusual sentence structure, the use of model verbs in English, and difference in legal system. As to the semantic difficulties, they involve lack of established terminology, finding functional and lexical equivalence, word for word t
... Show MoreViscosity (η) of solutions of 1-butanol, sec-butanol, isobutanol and tert-butanol were investigated in aqueous solution structures of ranged composition from 0.55 to 1 mol.dm-3 at 298.15 K. The data of (η/η˳) were evaluated based on reduced Jone - Dole equation; η/η˳ =BC+1. In the term of B value, the consequences based on solute-solvent interaction in aqueous solutions of alcohols were deliberated. The outcomes of this paper discloses that alcohols act as structure producers in the water. Additionally, it has shown that solute-solvent with interacting activity of identical magnitude is in water-alcohol system
This study aims to deeply analyze the character of serial killers in Thomas Harris’ novels and focuses on his novel Red Dragon. The Study searches in these complex and deep characters through the use of Erich Fromm's concepts about the destructive nature of the human psyche and what are the factors affecting serial killers in all social psychological, and biological aspects. This study Concluded: Thomas Harris portrayed the characters of serial killers in a professional and complex and made the reader go on a contemplative journey in the mind and soul of the serial killer, thus reaching the climax of artistic perfection.
Polycystic syndrome (PCOS) is a considerable infertility disorder in adolescents and adult women in reproductive age. Obesity is a vigorous risk factor related to POCS. This study aims to evaluate the association of obesity and PCOS by investigating several parameters including: anthropological, biochemical (lipid profile, fasting blood sugar, glucose tolerance test, and hormone levels (LH, FSH, LH/FSH ratio, Estradiol2 and Testosterone),and genetic parameters (Fat mass and Obesity associated gene (FTO) polymorphism at rs17817449) in 63 obese and non-obese PCOS women. The biochemical tests were investigated by colorimetric methods while FTO gene polymorphism was detected by PCR–RFLP. Lipid profile, F
... Show MoreZM Al-Bahrani, Medico Legal Update, 2021
This paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff
... Show MoreIn this paper, we will focus to one of the recent applications of PU-algebras in the coding theory, namely the construction of codes by soft sets PU-valued functions. First, we shall introduce the notion of soft sets PU-valued functions on PU-algebra and investigate some of its related properties.Moreover, the codes generated by a soft sets PU-valued function are constructed and several examples are given. Furthermore, example with graphs of binary block code constructed from a soft sets PU-valued function is constructed.