Zainab M. Al-Bahrani Department of Oral Diagnosis, College of Dentistry, University of Baghdad, Baghdad, Iraq.Corresponding author: Zainab M. Al-Bahra...
Deception is defined as a linguistic and non-linguistic behavior that is used in interaction in order to make the addressees believe what is believed to be false or lack evidence. McCornack (1992) classifies deception into four manipulative strategies (i.e., fabrication, distortion, equivocation and concealment), other scholars argue that deception encompasses the strategies of “fabrication (outright lying), equivocation (being vague and ambiguous), or concealment (with holding relevant information) Thus, the present study investigates the deception strategies and motives that are used by Johnny Depp and Amber Heard during their defamation trials. Qualitative and quantitative methods are employed when analyzing the data in question. Th
... Show MoreThe art of Islamic ceramics is considered one of the main pillars of the art of ceramics in the plastic arts, as his knowledge of what is presented in the Islamic arts intertwined in a special way. And the Islamic ceramics are indications of fertility and the rekindling of religious ties, controversy over them, and interpretation as additions to their vocabulary. Studies in the plastic arts began to empty the knowledge towards this direction, especially its relationship to the Arabic calligraphy and specifically the Islamic decoration, which derived the first aesthetic values from calling the artist Muslim pottery and potters to inviting the Arabic letter and Islamic decoration to indicate within the theory of "displacement" the aestheti
... Show MoreAim: The purpose of this study was to analyze the patterns of facial fractures in children and to compare them between preschool- and school-aged children. Materials and methods: This retrospective observational study included 57 children with facial fractures. The variables analyzed were the age of the patients—divided into a preschool-aged group (0–5 years) and a school-aged group (6–12 years)—gender, cause of trauma, the facial bones involved, the pattern of fracture, the modality of treatment used, the time between injury and treatment, and the postoperative complications. Results: The incidence of facial fractures in children ≤12 years was 30.2%. The patients consisted of 40 (70.2%) males and 17 (29.8%) females, and most pati
... Show MoreDrag reduction (DR) techniques are used to improve the flow by spare the flow energy. The applications of DR are conduits in oil pipelines, oil well operations and flood water disposal, many techniques for drag reduction are used. One of these techniques is microbubbles. In this work, reduce of drag percent occurs by using a small bubbles of air pumped in the fluid transported. Gasoil is used as liquid transporting in the pipelines and air pumped as microbubbles. This study shows that the maximum value of drag reduction is 25.11%.
This research tackles the play of Synge "Rider to the Sea" to find out whether the
theories of Leech (1983) and Brown and Levinson (1987) can be applied or not to this study.
The model of Leech (1983) consists of seven principles and for Brown and Levinson
(1987),it consists of two principles of politeness where one of them is positive and the other is
negative politeness.
It is hypothesed that:
1. There is a relation between the two theories.
2. Synge deals with these theories in such a way to depict his characters.
3. It is also hypothesed that every character deals with these principles in such a way to show
the events of the play.
The study concludes that there is a relation between the two theories in d
In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show MoreFor in the Holy Qur’an there are vivid examples and speaking models that tell stories of the tyrants who filled the world with tyranny and overwhelmed it with tyranny, and the Holy Qur’an presents these proverbs to people, not so that they may be amused by them, but rather so that they consider and bite with them. For every tyrannical tyrant, he lives within a framework of self-loss, according to him from life he lives and suffices, even without attachment to a principle or an ideal, and in the world of the unconscious with his whims, without any regard for death that is closer to him than his jugular vein, or for an account that does not leave small or great Therefore, the title of my research came to this (Qarun in the Holy Qur’a
... Show MoreWarfarin dosing is challenging due to a multitude of factors affecting its pharmacokinetics (PK) and pharmacodynamics (PD). A novel personalised dosing algorithm predicated on a warfarin PK/PD model and incorporating CYP2C9 and VKORC1 genotype information has been developed for children. The present prospective, observational study aimed to compare the model with conventional weight-based dosing. The study involved two groups of children post-cardiac surgery: Group 1 were warfarin naïve, in whom loading and maintenance doses were estimated using the model over a 6-month duration and compared to historical case-matched controls. Group 2 were already established on maintenance therapy a