The present study is a qualitative study that aims to investigate the way the Iraqi caricaturist,Dheaa Al-Hajjar uses caricatures to produce a satirical meaning humorously.Producing satire while at the same maintaining humor requires a creative thinking on the part of the caricaturist. Thus, the study examines the production of humorous satire in terms of creativity. The analysis is done from the cognitive linguistic point of view using Arthur Koestler's theory of bisociation as presented in his book The Act of Creation in 1964. The main principle on which the theory is based is that humor is created via linking (or bisociating in Koestler's terms) two habitually incompatible trains of thought in order to come up with a novel me
... Show Morepatterns of utterance stress in discourse direct attention to specific themes and reactions, controlling the flow and coherence of conversation. this study examines the utterance stress in Steve Harvey's selected episodes from a phono-stylistic perspective. this study is hoped to improve understanding of linguistic mechanism in talk show communication, highlighting the importance of phonetic features in transmitting meaning and increasing broadcast conversation participation. the researcher concentrates on the types of focus functions of utterance stress of some episodes available on YouTube. to conduct the analysis, the researcher adopts (Carr, 2013; Davenport& Hannahs 2005) to analyze utterance stress and Leech and Short (2007
... Show MoreThe present paper respects 'inversion' as a habit of arranging the language of modern English and Arabic poetry . Inversion is a significant phenomenon generally in modern literature and particularly in poetry that it treats poetic text as it is a violator to the ordinary text. The paper displays the common patterns and functions of inversion which are spotted in modern English and Arabic poetry in order to show aspects of similarities and differences in both languages. It concludes that inversion is most commonly used in English and Arabic poetry in which it may both satisfy the demands of sound correspondence and emphasis. English and Arabic poetic languages vary in extant to their manipulation of inverted styles as they show changeable f
... Show MoreIt is well known that the spread of cancer or tumor growth increases in polluted environments. In this paper, the dynamic behavior of the cancer model in the polluted environment is studied taking into consideration the delay in clearance of the environment from their contamination. The set of differential equations that simulates this epidemic model is formulated. The existence, uniqueness, and the bound of the solution are discussed. The local and global stability conditions of disease-free and endemic equilibrium points are investigated. The occurrence of the Hopf bifurcation around the endemic equilibrium point is proved. The stability and direction of the periodic dynamics are studied. Finally, the paper is ended with a numerical simul
... Show MoreBackground: Patients requiring renal biopsies have various glomerular diseases according to their demographic characteristics.
Objective: To study types of glomerular disease among adult Iraqi patients in a single center in Baghdad/Iraq
Material and Methods: A total of 120 native kidney biopsies were studied. All biopsies were adequate and were processed for Light Microscopy.
The age range of the study patients was 17-67 years, with a mean of 38.5 years. The mean follow up period was 28 weeks (4-52 weeks)
Indication for biopsy included: Nephrotic syndrome (N=72; 60%), Asymptomatic proteinuria (N=21; 17.5%), acute nephritic presentation (N=17; 14.16%), asymptomatic haematuria (N=10; 8.33%).
Results: Primary glomerulonephrit
The growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreThis study has contributed to understanding a delayed prey-predator system involving cannibalism. The system is assumed to use the Holling type II functional response to describe the consuming process and incorporates the predator’s refuge against the cannibalism process. The characteristics of the solution are discussed. All potential equilibrium points have been identified. All equilibrium points’ local stability analyses for all time delay values are investigated. The system exhibits a Hopf bifurcation at the coexistence equilibrium, which is further demonstrated. The center manifold and normal form theorems for functional differential equations are then used to establish the direction of Hopf bifurcation and the stability of the per
... Show More