This research attempts to investigate narrative structure in oral narrative particularly in Oprah's Show from a sociolinguistic viewpoint. Narrative is said to be universal in the sense that it is found in all times and places. There is no society or culture without narrative. Oral narrative is organized in a specific order. The research aims at studying and analyzing this order. In addition to that, it highlights the importance of narrative in conveying some moral messages to people who are listening to the story. The study is divided into two parts; theoretical and practical. The theoretical part draws on presenting a survey of literature which includes definitions and explanations of some related terms. The practical part is concerned with the analysis of the selected data. One episode from Oprah's Show is chosen for the analysis. The analysis of the data is carried out on the basis of Labov's (1972) model. The results show that (1) oral narrative depends mostly on real stories and participants.(2) Oral narrative follows a certain order and contains elements that are not found in written narrative such as, abstract and evaluation.
The current study was designed to investigate the alterations in the ultrastructure of orgenelles and cellular activity of exocrine pancreatic acini of experimentally induced-diabetic rats and to assess the usefulness of herbal combination supplementation in improving the ultrastructure and cellular activity of exocrine pancreas. The number of albino male rats used were 24 which divided into equally 4 groups; group I: control group, group II: alloxan-induced diabetes mellitus (single intraperitoneal dose of alloxan 120 mg/kg for 3 days), group III: herbal combination treatment composed from the extracts of fenugreek seeds (Trigonella foenum-graecum), black cumin (Nigella sativa) seeds, rhizomes
... Show MoreThis study was designed to know the effect of Diclofenac sodium (voltaren) drug on the histological composition of kidney in domestic rabbits . Twelve adult males with (1.4) kg weight . The first group of animals administrated orally by 1 ml of Voltaren with 6 mg/kg , while the second group with (1) ml of distal water (as control group ) . the administrated continue for (60) days sequentially. The treatment with voltaren showed pathological cases in tissues and cells of kidney including necrosis, infilteration ,congestion in blood vessels edema.Also epithelial separation in kidney tubules in comparison with control group Conclusion from the above results, revealed that voltaren had negative effects on the kidn
... Show MoreThe personality characteristics of the Leader are considered one of the main elements to reach into business organizations entrepreneurship; and because of the development of the organizations of the continuous transformations as result of huge Competition in private High Education sector, there is a great need for Leaders characterized of certain personality capable of managing their organizations and can positively effect on them. Also these organizations' success to reach into entrepreneurship requires a main significant element that is (strategic flexibility) which is considered one of the important elements for success.
Accordingly, this research is trying to fin
... Show MoreThe Mandaean religion of ancient and important religions in Iraq and Iran has its own rituals which are characterized by the use of singing and toning of speech. It began with the creation of human beings through a group of prophets. Peace be upon them. Researcher research problem, and explained the importance of research and objectives and limits and identify terminology. The second topic is the theoretical framework to include the history of the Sabean Mandaean, secondly their religious rites, sources, major books and secondary books for the Latin tribes of Mandaean. Finally, the researcher tackled the sources of their sacred books and previous studies. The third topic represented the procedures. The researcher dealt with the musical a
... Show MoreThis study aims to answer the following question: Is a student who attaches to the social group strongly affected by social interaction and social status? The population of the study included a group of medical students at the University of Al-Kufa. To collect the required data, a scale of Social Group Attachment consisting of (25) items was administered to a sample of (600) students, (257) male students, and (343) female students. The results revealed that students do not have a high level of attachment to the social group and they have a fear of that. There are no significant differences between the levels of attachment between males and females. There are no significant differences regarding colleges, the four academic levels, a
... Show MoreA steel-concrete composite structure (1) is described. The steel-concrete composite structure comprises a steel member (2) having an upper surface (5) and a plurality of shear connector elements (6) upstanding from the upper surface and a concrete slab (4) having upper and lower surfaces (7, 8). The slab is supported on its lower surface by the upper surface of the steel member. The slab comprises a plurality of through holes (9) between the upper and lower surfaces, each through hole tapering towards the lower surface so as to form an inverted frustally-shaped seating surface (10). The concrete slab is configured and positioned with respect to the steel member such that at least one shear connector element projects into each through hole.
... Show MoreLearning programming is among the top challenges in computer science education. A part of that, program visualization (PV) is used as a tool to overcome the high failure and drop-out rates in an introductory programming course. Nevertheless, there are rising concerns about the effectiveness of the existing PV tools following the mixed results derived from various studies. Student engagement is also considered a vital factor in building a successful PV, while it is also an important part of the learning process in general. Several techniques have been introduced to enhance PV engagement; however, student engagement with PV is still challenging. This paper employed three theories—constructivism, social constructivism and cognitive load t
... Show MoreIntroduction: Infection control or hospital-acquired infections are the major concern of the health care system and agencies. Critical care nurses are on the first-line contact with the patients, so on, they are most vulnerable to acquired infections. It is really important to regularly check their knowledge and practices concerning infection control. Objectives: The study aims to identify the impact of years’ experience on nurses’ knowledge and practices concerning infection control in three hospitals and center (Baghdad teaching hospital, Ibn Al-Nafees hospital, and Ibn al-Bitar center) Methodology: Cross-sectional study was conducted, the study starting from 4th of July 2020 to 13th of November 2020. Non-probability (purposive) sampl
... Show MoreAIM: To analyse our experiences in the management of traumatic retroperitoneal hematoma (RPH), highlighting the various challenges faced and to report on the outcome of these patients. METHODS: From May 2014 to May 2017, all patients with traumatic RPH who underwent surgical treatment were retrospectively analysed. The kind of injury, intraoperative findings, sites of hematoma, postoperative morbidity and the overall outcomes were recorded. RESULTS: Ninety-six patients; 53 with blunt trauma and 43 with penetrating injury, were included in this study. The centre-medial hematoma was observed in 24 (25%) patients, lateral hematoma in 46 (47.9%) patients, pelvic hematoma in 19 (19.8%) patients, and multiple zone hematomas in
... Show MoreThe Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show More