Mental systems in ontological discourse turned into deliberative systems, derived from the non-coordinated thought that motivated ontological discourse, as an incomplete thought, after it became close to reason; Between creation and prevention, between reasoning and creation, between submission and ambition, the result of an interconnected entity that slays one another from one another, and intersects with one another, to produce a special pattern each time, completely different from its predecessor or to provide a path for the coordination of others, which is outside the linguistic event, or part From it, signs and marks, produced to a large extent M., and united the signs; to return again in a circular and rotational movement to produce it again from its linguistic surplus resulting from the transfer of the signified to be achieved in the function sometimes, or from the relationship between the signifier and the signified at another time, with this huge amount of existing assumptions sometimes and non-existent, but it is in all Once you make the speaker present at this linguistic event.
The aim of the present study is to research two morphological processes: acronym and compounding (phrasal compounds/ circumlocution) and one syntactic category which are 'existential sentences' in science fiction short stories. The present paper identifies different types and rates of existential sentences. In this respect , 'bare existential and locative’ read the high percentages and may be contrasted with other classifications of English existential sentences which have a verb other than 'be' and a definite expression. 'Phrasal compounds' vary in rates as they constitute notable percentage for those that involve 'lexical means and lexical relations' followed by 'prepositional compounds' , 'conjunctional compounds' , and those invo
... Show MoreIn this time, most researchers toward about preparation of compounds according to green chemistry. This research describes the preparation of 2-fluoro-5-(substituted benzylideneamino) benzonitrile under reflux and microwave methods. Six azomethine compounds (B1-6) were synthesized by two methods under reflux and assisted microwave with the comparison between the two methods. Reflux method was prepared of azomethine (B1-6) by reaction of 5-amino-2-fluorobenzonitrile with some aldehyde derivatives with (50–100) mL of absolute ethanol and some quantity of GAA and time is limited between (2–5) hours with a yield between (60–70) percent with recrystallization for appropriate solvents. But the microwave-assisted method was synthesized of co
... Show MoreArab-Islamic architecture has undergone a change at multiple levels affected by modern technology, so the research sought to address the role of contemporary technologies on a fundamental and fundamental component of architecture, which is the architectural space, what is known as the essence of architecture and its ultimate destination, with a focus on the architectural space in the architecture of the contemporary Arab Islamic mosque, because the mosque’s architecture is so important in Islamic law and the belief of the Muslim person himself, where the mosque is the functional style produced by the Islamic faith and embodied in it, whereas, knowing the levels of influence of contemporary technologies in the architectural spac
... Show MoreNon-alcoholic fatty liver disease (NAFLD), characterized by hepatic fat accumulation in individuals consuming little or no alcohol, has become highly prevalent globally. Oxidative stress plays a central role in instigating inflammation and cell death pathways driving NAFLD progression. This case–control study aimed to elucidate the association between circulating levels of the pivotal non-enzymatic antioxidants – coenzyme Q10 and vitamins E and C – and liver injury parameters among 60 Iraqi NAFLD patients versus 30 healthy controls. NAFLD diagnosis entailed over 5% hepatic steatosis on ultrasound excluding other etiologies. Patients spanned three age groups: 20–29, 30–39, an
Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreMR Younus, Alustath, 2011
Arabic text categorization for pattern recognitions is challenging. We propose for the first time a novel holistic method based on clustering for classifying Arabic writer. The categorization is accomplished stage-wise. Firstly, these document images are sectioned into lines, words, and characters. Secondly, their structural and statistical features are obtained from sectioned portions. Thirdly, F-Measure is used to evaluate the performance of the extracted features and their combination in different linkage methods for each distance measures and different numbers of groups. Finally, experiments are conducted on the standard KHATT dataset of Arabic handwritten text comprised of varying samples from 1000 writers. The results in the generatio
... Show More