The aim of this paper is to examine cases of deletion not dependent on linguistic context. Perlmutter (1971) claims that any sentence other than an imperative1 in which there is an S that does not contain a subject in the surface structure is ungrammatical. Dillon (1978) counts elliptical sentences such as ^ Beg your pardon2 as grammatically incomplete (and hence as strictly ungrammatical). Such statements are, however, not without problems for reasons that will be given below.
Objective(s): Assess the effectiveness of osteoporosis prevention instruction program on nursing college students’
knowledge at Baghdad University.
Methodology: A quasi-experimental design was used to assess the effectiveness of osteoporosis prevention
instruction program on nursing college students at University of Baghdad from April 2011 to September 2011. A
random sample consisted of (40) females students from first year of Nursing College \ Baghdad University. The data
was collected by using constructed questionnaire, which consists of three parts. Part one: consists of demographic
information and health characteristics .Part two: consists of students’ daily life behaviors which include, dietary
behaviors, an
Wireless Body Area Sensor Networks (WBASNs) have garnered significant attention due to the implementation of self-automaton and modern technologies. Within the healthcare WBASN, certain sensed data hold greater significance than others in light of their critical aspect. Such vital data must be given within a specified time frame. Data loss and delay could not be tolerated in such types of systems. Intelligent algorithms are distinguished by their superior ability to interact with various data systems. Machine learning methods can analyze the gathered data and uncover previously unknown patterns and information. These approaches can also diagnose and notify critical conditions in patients under monitoring. This study implements two s
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThe detection of fungi contaminating maize grain and the effect of four plant extracts Azadirachta indica, Eucalyptus globulus Glycyrrhiza glabra and Zingiber officinale on the growth of A. flavus and its ability to produce AflatoxinB1. The results showed that the incidence of Aspergillus spp., was 52.75% of the isolated fungi, of which 29.50% was due to Aspergillus flavus, followed by Penicillium spp., with an incidence of 21.06%, and then Fusarium spp., with a rate of 18.13%. The percentage of toxin-producing A. flavus isolates reached 70.8% out of 24 isolates. The results showed the effect of alcoholic plant extracts at a concentration of 10 mg/ml on the fungal growth activity of A. flavus, the alcoholic extract of neem leaves was superi
... Show MoreIn the recent years the research on the activated carbon preparation from agro-waste and byproducts have been increased due to their potency for agro-waste elimination. This paper presents a literature review on the synthesis of activated carbon from agro-waste using microwave irradiation method for heating. The applicable approach is highlighted, as well as the effects of activation conditions including carbonization temperature, retention period, and impregnation ratio. The review reveals that the agricultural wastes heated using a chemical process and microwave energy can produce activated carbon with a surface area that is significantly higher than that using the conventional heating method.
The purpose of present work is to study the relationship of the deformed shape of the nucleus with the radioactivity of nuclei for (Uranium-238 and Thorium-232) series. To achieve our purposes we have been calculated the quadruple deformation parameter (β2) and the eccentricity (e) and compare the radioactive series with the change of the and (e) as indicator for the changing in the nucleus shape with the radioactivity. To obtain the value of quadruple deformation parameter (β2), the adopted value of quadruple transition probability B (E2; 0+ → 2+) was calculated from Global Best fit equation. While the eccentricity (e) was calculated from the values of the minor and major ellipsoid axis’s (a & b). From the results, it is obvi
... Show MoreThis article introduces the concept of finitely null-additive set function relative to the σ– ring and many properties of this concept have been discussed. Furthermore, to introduce and study the notion of finitely weakly null-additive set function relative to the σ– ring as a generalization of some concepts such as measure, countably additive, finitely additive, countably null-additive, countably weakly null-additive and finitely null-additive. As the first result, it has been proved that every finitely null-additive is a finitely weakly null-additive. Finally, the paper introduces a study of the concept of outer measure as a stronger form of finitely weakly null-additive.