The comparative study tries to find the common points in two different authors’ works and in this kind of studying so many other common but the hidden points may be revealed. Postwar literature is somehow one of the best literary genres for finding the common factors and features that the poets have tried to present in their works elements such as desire to be winner, cruelty, inhumanity, and absurdity of the war. The Iranian poet late Qaisar Aminpour(1961-2007) and Yusef Komunyakaa ( 1947) from Bogalusa, Louisiana, are among the great American and Iranian poets whose works so many times have been interpreted and analyzed. The finding the outstanding and the most important points and themes in the postwar poems of these two poets is the main aim of this literary comparative study.
Age, hypertension, and diabetes can cause significant alterations in arterial structure and function, including changes in lumen diameter (LD), intimal-medial thickness (IMT), flow velocities, and arterial compliance. These are also considered risk markers of atherosclerosis and cerebrovascular disease. A difference between right and left carotid artery blood flow and IMT has been reported by some researchers, and a difference in the incidence of nonlacunar stroke has been reported between the right and left brain hemispheres. The aim of this study was to determine whether there are differences between the right and left common carotid arteries and internal carotid arteries in patient
Some feline intestinal parasites such as Toxocara, Giardia, and Cryptosporidium can spread to humans through feces. Therefore, it is important to prevent exposure of family members by screening cat fecal samples twice per year for potential treatment regimes. This study was initiated to compare and identify gastrointestinal parasites of domestic and stray cats (Felis domesticus) in Baghdad City, Iraq. Parasite eggs and oocysts were identified under light microscopy by applying standard laboratory techniques (flotation and sedimentation). Overall, 59 of 121 (48.7%) fecal samples were positive for intestinal parasites. The rate of infection by Toxoplasma gondii was (3.31%), Isospora spp. (6.61%), Cryptosporidium spp. (31.4%), and Toxocara spp
... Show MoreASTRACT
The current study aimed to identify the quality of health services provided by the Omani health sector through the comparison between public and private hospitals in Dhofar Governorate, Oman. A questionnaire has been developed to collect data from 360 patients who received health services in one public Hospital (Sultan Qaboos) and three private Hospitals (Badr Al-Sama, Lifeline, and Al-Hakeeim). The data were analyzed using independent samples T-Test and One Way ANOVA. The results of the study showed that the quality levels of health services offered in private hospitals were better than public hospitals. The study results also reveled that there are significant differences between public hospitals and private hos
... Show MoreAdvanced strategies for production forecasting, operational optimization, and decision-making enhancement have been employed through reservoir management and machine learning (ML) techniques. A hybrid model is established to predict future gas output in a gas reservoir through historical production data, including reservoir pressure, cumulative gas production, and cumulative water production for 67 months. The procedure starts with data preprocessing and applies seasonal exponential smoothing (SES) to capture seasonality and trends in production data, while an Artificial Neural Network (ANN) captures complicated spatiotemporal connections. The history replication in the models is quantified for accuracy through metric keys such as m
... Show MoreThis research is based on the descriptive and analytical methodology. The importance of studying labor laws and labor unions in Japan between 1889 and 1946 constitutions is because Japan was out of a feudal phase, and had no idea about the factory system and industrialization in their modern sense before the Meiji era. Generally, its labor system used to be mostly familial, and the economic system was based on agriculture. This called for the enactment of legislations and laws appropriate for the coming phase in Meiji era. Thus, this paper examines the role of Meiji government in enacting labor legislations and laws when he came to power in 1896, and his new constitution in 1889 and the civil code of 1896. It further examines the way Mei
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreDAIRMD Professor Hayder R. Al-Hamamy, **Professor Adil A. Noaimi, **Dr. Ihsan A. Al-Turfy, IOSR Journal of Dental and Medical Sciences (IOSR-JDMS), 2015
In this review of literature, the light will be concentrated on the local drugs delivery systems for treating the periodontal diseases. Principles, types, advantages and indications of each type will be discussed in this paper.
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More