Stylistics represents a modern approach in understanding the literary text through the linguistic patterns that form it. The distinctive phenomena that the text includes constitute special features in it. As well as exploring its aesthetic aspects through description and analysis at the same time. The close link between stylistics and linguistics made stylistics occupy a prominent place in modern literary criticism.
In this regard, we do not want to dwell on the different directions of stylistics. Rather, we will prolong the discussion in the study of the style as a (deviation. Aversion) from the original. Because this trend plays on the chord of the paradox between the surface structure and the deep structure, especially when the surface structure is described as not grammatical but artistic rhetoric.
Background: One of the unique prosthesis for tooth or teeth replacement is the dental implant. Our attempt is using a biomaterial system that is easily obtained and applicable and has the ability to provoke osteoinductive growth factor to enhance bone formation at the site of application. One of these natural polymers is hyaluronic acid. Material and methods: Sixty machined surface implants from commercially pure titanium rod inserted in thirty NewZealand rabbits. Two implants placed in both tibia of each rabbit. The animals scarified at 1, 2 and 4 weeks after implantation (10 rabbits for each interval). For all of animals the right tibia’s implant was control (uncoated) and the left one was experimental (coated with 0.1ml Hyaluro
... Show MoreAbstract
The study presents a mathematical model with a disaggregating approach to the problem of production planning of a fida Company; which belongs to the ministry of Industry. The study considers disaggregating the entire production into 3 productive families of (hydraulic cylinders, Aldblatt (dampers), connections hydraulics with each holds similar characteristics in terms of the installation cost, production time and stock cost. The Consequences are an ultimate use of the available production capacity as well as meeting the requirements of these families at a minimal cost using linear programming. Moreover, the study considers developing a Master production schedule that drives detailed material and production requi
... Show MoreThe fatty acids in the embryo's liver at ages (7, 11, 14 and 19) days incubation, small chicken aged (14) days after hatching and adult were analyzed, and found (5) fatty acids, the highest concentration of fatty acid in the adult of domesticated chicken and lowest concentration in small chicken age (14) days after hatching. Statistically, there were high significant differences at the probability level (P≤0.001) between all ages together, and the highest concentrations of Oleic acid (C18:1) and Linoleic acid (C18:2) were in embryo age (7) days incubation, while in embryo age (11) days incubation Stearic acid (C18:0) and α-Linolenic acid (C18:3) were higher concentration and Palmitic acid (C16:0) was the highest concentration in the adul
... Show MoreThe success of the company's strategy depends to a large extent on the success of its functional areas, the marketing Mix makes the company more able to monitor the external environment and the rapid changes related to competitors and customers, as well as the innovation contributes to meet the needs of customers and the requirements of competition and try to find solutions to various problems in Innovation ways, and thus integrated marketing and Innovation efforts in the company towards the design of competitive services to meet the requirements of customers and competition. The research aims to determine how marketing Mix and innovation to design unique and distinct services compared to the competitors, through exporator a sample of en
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreBackground: Osteoid osteoma(OO) is a relatively common benign skeletal neoplasm of unknown etiology that is composed of osteoid and woven bone, usually seen in adolescent and young males Although, the clinical, radiological and scintigraphic features of OO have been well described, these features may be misleading or altered in the cases of lesser trochanter of the femur which is relatively uncommon location for OO with a few number of cases reported up to date. Case Presentation: We report a case of a 20-year-old man who presented with painful limpThe pain had begun six months earlier and was made worse by walking and by exercise., with normal initial X-rays .The diagnosis was made after six months when typical Computed tomography, magneti
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show More