This study aims at discussing how gender differences might affect communication among people. For this purpose, several TV interviews are selected and examined on the discourse level. Developing a model of analysis ,is found that certain linguistics have been used by male speakers ,whereas different aspects have been utilized my female speakers like deictic expressions and lexical items of emotion and delicacy .
BACKGROUND: The degree of the development of coronary collaterals is long considered an alternate – that is, a collateral – source of blood supply to an area of the myocardium threatened with vascular ischemia or insufficiency. Hence, the coronary collaterals are beneficial but can also promote harmful (adverse) effects. For instance, the coronary steal effect during the myocardial hyperemia phase and that of restenosis following coronary angioplasty. OBJECTIVES: Our study explores the contribution of coronary collaterals – if any exist – while considering other potential predictors, including demographics and medical history, toward the left ventricular (LV) dysfunction measured through the LV ejection fraction (LVEF). METH
... Show MoreThis study is intended to examine the concept of transcultural identity in the travel book The Global Soul: Jet Lag, Shopping Malls, and the Search for Home by (Iyer, 2001). Jeffries’ model of critical stylistics (2010) (henceforth, CS) has been selected to analyze the book. To be more specific, Negation is selected to analyze the concept under study. As such, the study aims at finding out how Negation is used to portray ideological meanings representing the concept of transcultural identity in one non-fictional travel book; and finding out the ideologies related to the concept analyzed. The analysis of the data shows that Negation is a suitable analytical tool to reach the ideational meaning of the text towards the concept of tra
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreIn this paper, the finite element method is used to study the dynamic behavior of the damaged rotating composite blade. Three dimensional, finite element programs were developed using a nine node laminated shell as a discretization element for the blade structure (the same element type is used for damaged and non-damaged structure). In this analysis the initial stress effect (geometric stiffness) and other rotational effects except the carioles acceleration effect are included. The investigation covers the effect speed of rotation, aspect ratio, skew angle, pre-twist angle, radius to length, layer lamination and fiber orientation of composite blade. After modeling a non-damaged rotating composite blade, the work procedure was to ap
... Show More<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e
... Show MoreThe research aims to reveal the role of financial analysis in rationalizing the investor decision on the Iraqi stock Exchange market, by studying the relationship and impact techniques and methods of financial analysis on the decisions of investors in the market. The most important techniques and methods discussed in this study were: analysis (financial ratios analysis, comparison of financial statements analysis, cash flow statement analysis) for companies listed in the Iraqi stock Exchange market. The researcher adopted the analytical descriptive method which depends on the collection of data on the phenomenon and its interpretation. The questionnaire wa
... Show MoreBackground: Knowledge about the prevalence and distribution of pathologies in a particular location is important when a differential diagnosis is being formulated. The aim of this study was to describe the prevalence and the clinicopathological features of odontogenic cysts and tumors affecting the maxilla and to discuss the unusual presentation of those lesions within maxillary sinus.
Materials and Methods: A multicenter retrospective analysis was performed on pathology archives of patients who were diagnosed with maxillary odontogenic cysts and tumors from 2010 to 2020. Data were collected with respect to age, gender and location.
Result: A total of 384 cases was identified, 320 (83.3%) cases were diagnosed as odontogenic
... Show MoreThis paper features the modeling and design of a pole placement and output Feedback control technique for the Active Vibration Control (AVC) of a smart flexible cantilever beam for a Single Input Single Output (SISO) case. Measurements and actuation actions done by using patches of piezoelectric layer, it is bonded to the master structure as sensor/actuator at a certain position of the cantilever beam.
The smart structure is modeled based on the concept of piezoelectric theory, Bernoulli -Euler beam theory, using Finite Element Method (FEM) and the state space techniques. The number of modes is reduced using the controllability and observability grammians retaining the first three
dominant vibratory modes, and for the reduced syste