The current research is concerned with studying the decisive answers which are considered quick and conclusive. These answers can effectively interrupt the opponent's argument and close the dialogue.This research is concentrated on deliberative methodology focusing on the decisive answer's activity and ending them through several completing and argument sides. This research consists of an introduction and three parts, the current introduction is focused the light on the concept of decisive answers and its uses in literature and the scarce of speech, and how to consider it with one dialogue description,that dialogue constitute by ? The first part is concerned with those answers through the deliberative methodology and classifying decisive
... Show MoreMaxillofacial trauma in females is not widely reported. This study aimed to analyze the clinical characteristics and the patterns of maxillofacial injuries in females and to determine the differences in these patterns among different causes. This retrospective study analyzed several variables, including demographic, social, injury-related, and treatment-related variables, and compared these variables in relation to the main etiologies of maxillofacial trauma. The main etiologies of maxillofacial injuries involving females were assault, followed by road traffic accidents, and falls. There were significant differences in relation to the 3 etiologies in age groups (
Online communication on social networks has become a never-given-up way of expressing and sharing views and opinions within the realm of all topics on earth, and that is that! A basis essential in this is the limits at which "freedom of expression" should not be trespassed so as not to fall into the expression of "hate speech". These two ends make a base in the UN regulations pertaining to human rights: One is free to express, but not to hate by expression. Hereunder, a Critical Discourse Analysis in terms of Fairclough's dialectical-relational approach (2001) is made of Facebook posts (being made by common people, and not of official nature) targeting Islam and Muslims. This is made so as to recognize these instances of "speech" a
... Show MoreComputer analysis of simple eye model is performed in the present work by using the Zemax optical design software 2000E . The most important optical parameters of the eye were calculated such as the effective focal length (EFL) , the image spot size at the retina and found to be in a reasonable agreement with the values needed for the laser retinal treatment .The present eye model leads to an effective wavelength and we found the image spot diagram at the surface of the retina and the wavefront error which are provided at zero field angle. This gives a good evidence of the validity of the model in one hand, and can be used to determine the compatibility of any optical design intended for visual applications. By using the pulse fre
... Show MoreIt is axiomatic that languages mirror the world view of their users. Manipulating honorific forms among people inevitably reflects this truth . Honorifics are conventionalized forms or expressions manifested in all the world's languages and are used to express the social status of the participants in the verbal interaction and to convey indications like politeness and respect . English is no exception. However the question is what exactly creates these forms and their meanings. Although honorifics have been extensively researched from a grammatical and semantic angle , yet they haven’t received that significant attention i
... Show MoreIn this paper a nonlinear adaptive control method is presented for a pH process, which is difficult to control due to the nonlinear and uncertainties. A theoretical and experimental investigation was conducted of the dynamic behavior of neutralization process in a continuous stirred tank reactor (CSTR). The process control was implemented using different control strategies, velocity form of PI control and nonlinear adaptive control. Through simulation studies it has been shown that the estimated parameters are in good agreement with the actual values and that the proposed adaptive controller has excellent tracking and regulation performance.
In this paper it was designed a new fractal optical modulation by using a new iteration of fractal function, the result was analyzed by MTF evaluation, and it compared with results of normal optical modulation.
The normal and fractal optical modulator is a circular disc which has a radius R=9cm, both of them consist of twenty sectors, ten sectors are opaque and the other ten sectors are transmitted for the light.
The fractal optical modulator contains two patterns, the pattern two can be used to detect the target, and pattern one can be used to lock the target
The best similarity of MTF behavior for normal and fractal Reticle was evaluating the power transparent depends on the size o
... Show MoreVariable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with
minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required informatio
A sample of 168 tonsillitic subjects (93 males and 75 females), livin g in Baghdad was evaluated microbiologically. The patients had an age range of 3-35 years. Four bacterial species were isolated and identified. They were P-haemolyt ic Streptococcus ,(39.3%) Staphylococcus
... Show More