This study aims to study argumentation in political debates by figuring out the logical fallacies employed in the debates of Clinton and Trump, the presidential nominees of the 2016 elections, and Biden and Trump, the leading contenders in the 2020 United States presidential election. The study attempts to answer the questions: (1) What relevance fallacies are adopted in the debate between Trump and Clinton? (2) What rhetorical devices are used to influence the audience and gain voters besides fallacies in the debates selected? The study analyses two texts from two arguments using Damer's (2009) taxonomy of relevance fallacy and rhetorical devices based on Perrine’s (1969) model of communication and interpersonal rhetoric to answe
... Show MoreThe paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.
Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreOne of the artificial lightweight aggregates with a wide range of applications is Lightweight Expanded Clay Aggregate. Clay is utilized in the production of light aggregates. Using leftover clay from significant infrastructure development projects to manufacture lightweight aggregates has a favorable environmental impact. This research examines the expanded clay aggregate production process and the impact of processing parameters on its physical and mechanical qualities. It also looks at secondary components that can be used to improve the qualities of concrete with expanded clay aggregates. The effect of the quantity of expanded clay aggregate on the fresh, hardened, and durability qualities of concrete is also studied.
... Show MoreThe natural ventilation in buildings is one of effective strategies for achieving energy efficiency in buildings by employing methods and ways of passive design, as well as its efficiency in providing high ranges of thermal comfort for occupants in buildings and raises their productivity. Because the concept of natural ventilation for many people confined to achieve through the windows and openings only, become necessary to provide this research to demonstrate the various passive design strategies for natural ventilation. Then, research problem: Insufficient knowledge about the importance and mechanism of the application of passive design strategies for natural ventilation in buildings. The research objective is: Analysis of passive desi
... Show MoreVisceral leishmaniasis(VL) or kala-azar is one of the world most neglected tropical diseases in mortality and fourth in morbidity, rK39 dipstick was used to diagnose the suspected infected patients as easiest and rapid technique for VL diagnostic, the disease out-coming required to the differentiation of cell mediated immunity either T-helper 1(Th-1) or (Th-2). One of main pointers that may be considered as one of immune evasion strategy in the host-parasite interplay is HLA-G level alteration. HLA-G Known as a special proteins (non-classical HLA class I) molecules which can suppress the immune system by T-cell functions impaired in the aid with target receptors as LILRB4. The development of the cell mediated immunity initiated with Interle
... Show MoreType 1 diabetes mellitus (T1DM) is an autoimmune disease frequently associated with autoimmune thyroid disease (AITD). The study is conducted at the Specialized Center for Endocrinology and Diabetes-Baghdad at Al-karkh side, during December 2013 up to April 2014. In this study, we investigate the prevalence of anti-thyroid peroxidase (anti-TPO) antibody in(80) type1 diabetic patients with (AITD) and (30) healthy controls .Blood samples are taken for investigation of thyroid tests by using Vitek Immunodiagnstic Assay System (VIDAS).Enzeme Linked Immunosorbent Assay (ELISA) is used to detect anti-thyroid antibody(anti-TPO). The results show that age, gender and BMI (body mass index) are similar in both groups, p>0.05. Among 80 type1 diabetic
... Show More