The present study aims to investigate the various request constructions used in Classical Arabic and Modern Arabic language by identifying the differences in their usage in these two different genres. Also, the study attempts to trace the cases of felicitous and infelicitous requests in the Arabic language. Methodologically, the current study employs a web-based corpus tool (Sketch Engine) to analyze different corpora: the first one is Classical Arabic, represented by King Saud University Corpus of Classical Arabic, while the second is The Arabic Web Corpus “arTenTen” representing Modern Arabic. To do so, the study relies on felicity conditions to qualitatively interpret the quantitative data, i.e., following a mixed mode method. The findings of the present study show that request constructions vary in terms of occurrence between Classical Arabic and Modern Arabic. In Classical Arabic, (/laa/ لا) of prohibition is the most frequent construction, which is rarely used in the Web corpus where the command in the form of (/lam/لام + verb) is the most commonly emerging one, which is, in turn, seldom employed in the former corpus. The vocative (/ya/ يا) is the second most frequent construction in Classical Arabic, whilst the interrogative (/hel/ هل) emerged in the other genre. The third most common request construction is the interrogative (/hel/ هل) in Classical Arabic, but the vocative (/ya/ يا) is used in Modern Arabic. Nonetheless, some of these constructions fail to accomplish two or more conditions and hence are regarded as infelicitous requests. Such infelicitous constructions serve other functions than requests, such as negation, exclamation, and sarcasm.
Background: Different mechanisms have been suggested for the development of nonsteroidal antiinflammatory drugs (NSAIDs) induced gastropathy. Angiotensin converting enzyme inhibitors have been suggested to have gastroprotective effects. This study investigates the gastroprotective effects of Angiotensin converting enzyme inhibitors, captopril and enalapril on indomethacin induced gastric mucosal damage in rats .
Materials and methods: The study was conducted on 50 adult male albino rats, divided into 5 groups, the first served as a control received the vehicle , the second received indomethacin orally of 60mg/kg. The third and fourth groups were pretreated orally 30 minute prior indomethacin with either&n
Thirty one samples of gum swabs were collected from patients with tooth caries (5-30 years old) from the College of Science (Biology department )- University of Baghdad- Iraq for the period from October 2018 to December 2018. , The samples were transported, after inoculation in a transport media (nutrient broth), to the laboratory of the College of Science and then cultured on mannitol salt agar and blood agar). The isolates belonging to Staphylococcus spp. were identified by biochemical tests and Vitek 2 compact system, while the more antibiotic resistant isolates were identified by using Polymerase Chain Reaction(ï´¾PCR) and sequencing of 16SrRNA . The results showed sharp UV absorption peaks at 330
... Show MoreRetainers have the potential to detrimentally impact periodontal health and contribute to tooth decay.
To investigate periodontal health and bacterial biofilm related to Poly-Ether-Ether-Ketone (PEEK) fixed retainers as compared to Dead-soft coaxial fixed retainer (DSC).
A two-arm parallel groups single-centre randomized c
Thirty one samples of gum swabs were collected from patients with tooth caries (5-30 years old) from the College of Science (Biology department )- University of Baghdad- Iraq for the period from October 2018 to December 2018. , The samples were transported, after inoculation in a transport media (nutrient broth), to the laboratory of the College of Science and then cultured on mannitol salt agar and blood agar). The isolates belonging to Staphylococcus spp. were identified by biochemical tests and Vitek 2 compact system, while the more antibiotic resistant isolates were identified by using Polymerase Chain Reaction(ï´¾PCR) and sequencing of 16SrRNA . The results showed sharp UV absorption peaks at 330 - 340nm and AFM at 5
... Show More: The Aluminium (Al) material emerged as a plasmonic material in the wavelength ranges from the ultraviolet to the visible bands in different on-chip plasmonic applications. In this paper, we demonstrate the effect of using Al on the electromagnetic (EM) field distribution of a compact hybrid plasmonic waveguide (HPW) acting as a polarization rotator. We compare the performance of Al with other familiar metals that are widely used as plasmonic materials, which are Silver (Ag) and Gold (Au). Furthermore, we study the effect of reducing the geometrical dimensions of the used materials on the EM field distributions inside the HPW and, consequently, on the efficiency of the polarization rotation. We perform the study based o
... Show MoreRepresent choices Behaviorism available to the Managerial leaders one of the prerequisites to run any beginnings of a psychological or dilemmas Managerial barriers to working in the field of work has been varied these options until it had taken several kinds of which contributed to the left different impacts on the alleviation of these problems, which prompted the researcher to raising the problem of study within the framework of questionable content how to contribute to that shown by Choices Behaviorism accredited to the Managerial leaders in the management of frustration
... Show MoreAcquisition provisions in Islamic jurisprudence
Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show More