The propagation of laser beam in the underdense deuterium plasma has been studied via computer simulation using the fluid model. An appropriate computer code “HEATER” has been modified and is used for this purpose. The propagation is taken to be in a cylindrical symmetric medium. Different laser wavelengths (1 = 10.6 m, 2 = 1.06 m, and 3 = 0.53 m) with a Gaussian pulse type and 15 ns pulse widths have been considered. Absorption energy and laser flux have been calculated for different plasma and laser parameters. The absorbed laser energy showed maximum for = 0.53 m. This high absorbitivity was inferred to the effect of the pondermotive force.
The paper is concerned with a linguistic analysis of the blurbs, used in advertising English and Arabic novels. A blurb is an advertising persuasive text, written on the back cover of a book. Blurbs of selected novels are chosen as representative examples. The selected blurbs belong to two languages, Arabic and English. The paper aims at studying the linguistic features that are characteristic of blurbs as advertising texts and making a sort of comparison between English blurbs and Arabic ones. A linguistic analysis on four levels is presented. Blurbs are tackled from the point of view of four linguistic disciplines that are phonology, syntax, semantics and discourse analysis. A reference is made to the linguistic featu
... Show MoreAfter the issuance of agrarian reform first law of 1958 events social economic
accelerating out of sync with political events on the application of the agrarian reform law
issued a government executive branch law number (74) in May 1959 was the introduction of
the ministry of Agrarian reform and the development of a new system of the ministry of
agrarian reform and its department to determine structural ministry the new work started
department of the ministry ptt.
Pun concept the design discourse for the cover of magazines the researcher chose the German magazine Der Spiegel as a model for that, as the research problem was manifested by the following question: What are the representations of puns in the covers of the German magazine (Der Spiegel)? The researcher has identified four chapters for this study as follows: The first chapter is devoted to research procedures, and the theoretical framework, which is like the second chapter, included the literature related to the topic of research according to the two interlocutors. A review of the concept of pun in the field of typographic design and the functions that puns achieve in that field, leading to the third chapter, which included the analysis
... Show MoreThis study confirms the ubiquitin conjugating enzyme 2B (Rad6) plays a significant role in the DNA repair pathway also because the ubiquitin-conjugating pathway. The DNA repair pathway could be a variety of bypass repair mechanism where the broken base pair is bypassed by permitting the replication fork to labor under the site of injury. This is often done by a shift mechanism wherever deoxyribonucleic acid enzyme - δ is switched with DNA enzyme - η (DNAP - η). Site of DNAP - η is massive enough to permit the broken ester to labor under, and so bypass the broken nucleotide. However, this is often potential solely through the involvement of Proliferating cell nuclear antigen (PCNA) that could be a processivity issue and it acts as a plat
... Show MoreBackground and objective: Viral Hepatitis Type B&C is serious public health challenge throughout the world.Hepatitis B and C viruses still remain to be the major causes of chronic hepatitis.It is estimated that around 350-400 million people in the world are chronic carriers of HBV, which represents approximately 7% of the total populationwhereas infection with HCV is found in approximately 3% of the world population, which represents 160 million people. Hepatitis B infection has a wide range of seroprevalence in the Mediterranean countries ranging from intermediate (=>2% ) to high prevalence ( =>7%). World Health Organization estimated a prevalence rate for HCV infection of about 4.6% in Eastern Mediterranean in 1999. During the eightieths
... Show MoreThe current study was conducted in the environment of the Martyr Monument Lake in the city center of Baghdad during 2019 to monitor the impact of climatic conditions such as drought, water shortage, high temperatures in the environment of the city and the lack of water flow during the years 2015 to 2018 and their effects on some of the physical and chemical factors of water and the dynamics of the phytoplankton community in the lake environment. Heterogeneity of some studied environmental factors, including air and water temperature, permeability, water depth, pH, DO, BOD5, nutrients, nitrate, NO3, and phosphates were found. The results showed the effect of climate change and the pres
Background: 37% phosphoric acid (PA) is the traditional enamel etching technique prior to bracket adhesion, yet it has been implicated in numerous enamel injuries. The purpose of the current study was to create a calcium phosphate (CaP) etching paste in a simplified capsule formula that can underpin clinically adequate bracket bond strength without jeopardizing the integrity of enamel upon the debracketing procedure. Materials and Methods: micro-sized hydroxyapatite (HA) powder was mixed with 40% PA solution to prepare experimental acidic CaP paste. Sixty human premolars were assigned into two groups of 30 each. Enamel conditioning was accomplished using 37% PA-gel for control group and CaP paste for e
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More