Sarcasm is conceders one patterns of undesirable communication, which causes social problems in humans relationships because of the contradictory verbal and nonverbal expressions is known sarcasm may defined , statements with intent to belittle others in different situations, dealing with the individual deliberately, to diminish the will or overwhelmed by the recipe stupid, which generate a reaction when a person listener, raising the intentions of ridicule and undermine it, and this may happen is different from the irony interest increased in sarcasm since the development of scientists "Watzlawick '" and Bevin "Jackson's" in 1967 theory interactive and considered the sarcasm one interaction patterns in the social relationship, which use
... Show MoreThe last decade of this 20th century provides a wide spread of applications of one of the computer techniques, which is called Fuzzy Logic. This technique depends mainly on the fuzzy set theory, which is considered as a general domain with respect to the conventional set theory. This paper presents in initiative the fuzzy sets theory and fuzzy logic as a complete mathematics system. Here it was explained the concept of fuzzy set and defined the operations of fuzzy logic. It contains eleven operations beside the other operations which related to fuzzy algebra. Such search is considered as an enhancement for supporting the others waiting search activities in this field.
Media has become a common platform for communication as a tool of offense. English language has many insult words which are commonly used in the world of media. This study investigates the socio-pragmatic aspect of insulting in English news. It aims at identifying and analysing insult words and expressions used by news presenters. To specify the problem of the study, language has a harmful power that hurts the addressees and seriously harm their psychological well-being. The insulting words that are an element of all human languages are the source of this abusive power. The study questions sought to find out are if news presenters use insult words, which insult words, and in what social contexts. In this study, the descriptive method is use
... Show MoreAW Ali T, Journal of the Faculty of Medicine, 2016 - Cited by 1
Several schottky diodes were fabricated from polyaniline/ Carbon nanotube (single and multiwalled) composites. These composites were synthesized with different concentration and two carbon nanotubes types, Single and Multi-Walled Carbon Nanotubes (SWCNT & MWCNT). Aluminum and silver paste were chosen as schottky and ohmic contact respectively. physical and electrical were used to studied these composite by using Atomic Force Microscopy (AFM) and electrical measurements. The Root Mean Square RMS surface roughness of the composite samples was found to be around 4nm. The currentvoltage characteristic were measurements for all samples in the bias range ±15V at room temperature. The results shows the increasing in carbon nanotubes concentration
... Show MoreInflammation of the tonsils could be described as acute tonsillitis, mainly due to infection. Recurrent tonsillitis could be defined as 3-7 episodes during the first 3 years of age. Vitamin D, which is a neuro-hormone with pleiotropic biological activities may modulate the immune response by alleviation, and stimulation of Th1 and Th2 cell proliferation, respectively, that influence the stimulation, synthesis, and secretion of both pro and anti-inflammatory cytokines. In this study we aimed to shed light on the levels of vitamin D in children with different episodes of tonsillitis in association with levels of interleukins (TNFα, IL-2, IL-4, IL-10). Blood samples were collected from 48 participants in 3 groups: control, acute tonsilliti
... Show MoreThe use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree mode
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show More