Preferred Language
Articles
/
TxdX240BVTCNdQwCDycV
Cognitive Stylistic Analysis of Daily Yahoo Storie
...Show More Authors

Cognitive stylistics is one discipline of applied linguistics that relies on the reader’s interpretation and inference of the meaning of the text depending on his background knowledge. It studies how the reader understands the text and mapping it with his real experiences (Jeffries and McIntyre,2010). The present study is a cognitive stylistic analysis of digital stories. Digital stories are short narratives made by a combination of different sorts of digital media such as pictures, audios and videos. These digital media are employed to tell stories about oneself, famous people, and important events. The analyzed stories are selected from “Daily Yahoo Stories” and are analyzed according to Lakoff (1993) approach, The analysis investigates the use of figures of speech in this type of stories and how they are mapped with the reader’s perceptions. The results show that figures of speech like simile, personification and metaphor do exist in everyday language. Also the use of multimedia alongside with the use of figures of speech in digital stories play a great role in interpreting and understanding the text by the reader

Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
The Bifurcation Analysis of Food Web Prey- Predator Model with Toxin
...Show More Authors
Abstract<p>Local and global bifurcations of food web model consists of immature and mature preys, first predator, and second predator with the current of toxicity and harvesting was studied. It is shown that a trans-critical bifurcation occurs at the equilibrium point <italic>E</italic> <sub>0</sub>, and it revealed the existence of saddle-node bifurcation occurred at equilibrium points <italic>E</italic> <sub>1</sub>, <italic>E</italic> <sub>2</sub> and <italic>E</italic> <sub>3</sub>. At any point, the occurrence of bifurcation of the pitch for</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Tue Oct 01 2024
Journal Name
Science Progress
Jaw vs abdominal Burkitt's lymphoma: An analysis of 25 Iraqi cases
...Show More Authors

This study compared the clinicopathological, immunohistochemical characteristics and Epstein-Barr virus (EBV) detection of Burkitt's lymphoma (BL) in the abdomen and jaw of Iraqi patients. A cohort/retrospective study was carried out between August and September 2024 using 25 tissue blocks (14 gnathic and 11 abdominal BL) from the Oral and Maxillofacial Laboratory, University of Baghdad, College of Dentistry, and the National Centre for Educational Laboratories. The sections were stained with haematoxylin and eosin (H&E), while CD10, CD20, Bcl-2, BCl-6, C-Myc and Ki-67 markers were used for diagnosis. The DNA detection of the EBV was performed by polymerase chain reaction (PCR). The tumours showed 22 classical and 3 atypical histologi

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2016
Journal Name
I-manager’s Journal On Communication Engineering And Systems
SOLVING NETWORK CONGESTION PROBLEM BY QUALITY OF SERVICE ANALYSIS USING OPNET
...Show More Authors

Among many problems that reduced the performance of the network, especially Wide Area Network, congestion is one of these, which is caused when traffic request reaches or exceeds the available capacity of a route, resulting in blocking and less throughput per unit time. Congestion management attributes try to manage such cases. The work presented in this paper deals with an important issue that is the Quality of Service (QoS) techniques. QoS is the combination effect on service level, which locates the user's degree of contentment of the service. In this paper, packet schedulers (FIFO, WFQ, CQ and PQ) were implemented and evaluated under different applications with different priorities. The results show that WFQ scheduler gives acceptable r

... Show More
Publication Date
Thu May 01 2003
Journal Name
Renewable Energy
FT-IR and XPS analysis of a-Si1-xGex:H thin films
...Show More Authors

View Publication
Scopus (14)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Mon Dec 10 2018
Journal Name
Day 1 Mon, December 10, 2018
Wellbore Trajectory Optimization Using Rate of Penetration and Wellbore Stability Analysis
...Show More Authors

Drilling deviated wells is a frequently used approach in the oil and gas industry to increase the productivity of wells in reservoirs with a small thickness. Drilling these wells has been a challenge due to the low rate of penetration (ROP) and severe wellbore instability issues. The objective of this research is to reach a better drilling performance by reducing drilling time and increasing wellbore stability.

In this work, the first step was to develop a model that predicts the ROP for deviated wells by applying Artificial Neural Networks (ANNs). In the modeling, azimuth (AZI) and inclination (INC) of the wellbore trajectory, controllable drilling parameters, unconfined compressive strength (UCS), formation

... Show More
View Publication
Crossref (12)
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Mon Oct 09 2023
Journal Name
2023 Ieee 34th International Symposium On Software Reliability Engineering Workshops (issrew)
Semantics-Based, Automated Preparation of Exploratory Data Analysis for Complex Systems
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Iraqi Journal Of Physics
Spectroscopic analysis of magnesium-aluminum alloys by laser induced breakdown spectroscopy
...Show More Authors

In this work, the spectra of plasma glow produced by Nd:YAG laser operated at 1.064 μm on Al-Mg alloys with same molar ratio samples in air were analyzed by comparing the atomic lines of aluminum and magnesium with that of strong standard lines. The effect of laser energies on spectral lines, produced by laser ablation, were investigated using optical spectroscopy, the electron density was measured utilizing the Stark broadening of magnesium-aluminum lines and the electron temperature was calculated from the standard Boltzmann plot method. The results that show the electron temperature increases in magnesium and aluminum targets but decreases in magnesium: aluminum alloy target, also show the electron density increase all the aluminum,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Dar Amjad For Publishing And Distribution, The Hashemite Kingdom Of Jordan
Statistical Analysis of Non-parametric Tests Using IBM SPSS Statistics Version24
...Show More Authors

أن الطرق اللامعلمية هي نوع من الطرق الاحصائية الاستدلالية التي يمكن استخدامها للتوصل إلى أستنتاجات لذا كان حرص المؤلف على أصدار هذا الكتاب والذي يعمل على توضيح ( لماذا ؟ ومتى ؟ وكيف ؟ ) تستخدم كل طريقة إحصائية . وبإمكان القاريء سواء أكان أستاذا ً جامعيا ً أو باحثا ً أو طالبا ً في الدراسات العليا ( الماجستير والدكتوراه ) أو طالبا ً في الدراسات الأولية أن يتتبع جميع الخطوات لحساب كل قانون إحصائي وبدءا ً من عملية إدخ

... Show More
Publication Date
Wed Jul 05 2023
Journal Name
Journal Of Pragmatics Research
Analysis of Impoliteness Strategies Used in Putin's Speech at Annexation Ceremony
...Show More Authors

This study aims to investigate the types of impoliteness strategies used in Putin's speech at the annexation ceremony. All of Putin's speeches were intentionally delivered to cause damage to the hearers' negative and positive faces. Culpeper's (2011) classifications of impoliteness, which consist of five strategies that are the opposite of politeness, were adopted. The data were collected from the President of Russia, providing a rich source for analysis. Qualitative and quantitative analyses were employed to achieve the study objectives. Qualitative analysis allowed for a detailed examination of the impoliteness strategies employed, while quantitative analysis provided a broader understanding of their frequency and distribution. Putin most

... Show More
View Publication Preview PDF
Crossref