This paper is an attempt to investigate the syntactic and semantic features of the English phrasal verbs. In this paper, phrasal verbs were classified into subgroups according to their syntactic and semantic characteristics. After giving a survey of literature written on the meaning and definition of phrasal verbs, two sections have been devoted to tackle the most important issues in this category of English verbs. Section one sheds light on the basic definitions of the term ‘phrasal verb’ which are, according to the researcher’s point of view, sufficient to cover the area of the study. In addition, it studies the number and the importance of phrasal verbs in English. Section two deals with the syntactic and semantic features of English phrasal verbs. It shows whether these phrasal verbs are transitive \ intransitive and separable\ inseparable, as well as it focuses on the differences between phrasal verbs and prepositional verbs. Finally, the literal and idiomatic usage of English phrasal verbs has been tackled. In the light of the findings of the study a number of conclusions are drawn
Abstract: Residual ridge resorption is chronic, progressive, irreversible and cumulative condition associated with teeth loss. Management of a residual ridge with severe resorption to fulfill the patient’s esthetic and functional requirements is quite difficult for the practitioner and also in the construction of an acceptable appliance. As the height of the edentulous ridge reduces the mandibular denture will be improperly function. Severe resorption of the mandibular alveolar ridge may cause instability and discomfort of the convention acrylic resin denture. Dealing with this condition requires clinical skills and knowledge. Treating the severely resorbed mandibular ridge is a challenging effort for prosthodontics. This research present
... Show MoreSince Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreTransport is a problem and one of the most important mathematical methods that help in making the right decision for the transfer of goods from sources of supply to demand centers and the lowest possible costs, In this research, the mathematical model of the three-dimensional transport problem in which the transport of goods is not homogeneous was constructed. The simplex programming method was used to solve the problem of transporting the three food products (rice, oil, paste) from warehouses to the student areas in Baghdad, This model proved its efficiency in reducing the total transport costs of the three products. After the model was solved in (Winqsb) program, the results showed that the total cost of transportation is (269,
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreMorphological and phonological studies of fungal pathogen infecting alfalfa weevil Hypera postica (Gyllenhal) indicating that infection has been shown to develop along two distinct physiological lines, each culminating in the production of either conidial or resting spores, in host cadavers which are morphologically distinct. The percent of infection and epizootic development appeared to be dependent on host density. Farther evidence to entail proper correlation between conidia and resting spores suggest that these two forms of spores are stages in the development of one pathogen.
The paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.
Most of the water pollutants with dyes are leftovers from industries, including textiles, wool and others. There are many ways to remove dyes such as sorption, oxidation, coagulation, filtration, and biodegradation, Chlorination, ozonation, chemical precipitation, adsorption, electrochemical processes, membrane approaches, and biological treatment are among the most widely used technologies for removing colors from wastewater. Dyes are divided into two types: natural dyes and synthetic dyes.