الاستثمار الاجنبي المباشر في العراق ودوره في تحقيق التنمية الاقتصادية
A new type of the connected domination parameters called tadpole domination number of a graph is introduced. Tadpole domination number for some standard graphs is determined, and some bounds for this number are obtained. Additionally, a new graph, finite, simple, undirected and connected, is introduced named weaver graph. Tadpole domination is calculated for this graph with other families of graphs.
Schemata are the underlying connections that allow new experience and information to be aligned with previous knowledge. When one reads a text he usually uses all his levels of schemata. Schemata enable us to make sense of what is perceived and experienced in the world.
In poetry, readers usually examine carefully and deeply what they are reading in comparison with other sorts of discourse. Coherence is achieved when a reader perceives connections among schemata. It is a connection between linguistic and textual features of the text, and reader's mental expectations as well as stored knowledge of the world. This paper discusses the role of schematic correlation in poetry, and the effect of different schematic background and diffe
... Show MoreThe present paper studies the use of adjectives in Shakespeare's Sonnets (4, 5, 6, & 9), which are chosen randomly, on the three levels: grammar, lexis and conversation. It tackles adjectives as a literary term with presenting their forms and functions. The presentation is done according to the themes, their forms and functions in conversation, the adjectives are shown in this paper as for their forms, frequency and meanings in the sonnets and their effects on studying. The analysis is done according to Quirk et al. (1985) and Quirk and Greenbaum (1973). Then, all adjectives have been calculated in the sonnets. The results of the analysis have shown that compound adjectives which occurred (31) are used more than the Suffixation
... Show MoreAdvertisement is a general phenomenon in our everyday life. In most cases, it is established for commercial purposes i.e. it is oriented for certain goals and waiting for results. One form of advertisement is a blurb. In this study, the researcher applies Fonton and Saint-Dizier (2010) and Hymes (1962) models on 23 blurbs. These two models are chosen on consideration of accounting grammatical categories and speech events respectively. The study tends to answer the following question: How do blurb’s writers exploit language to convince the reader to buy the intended book? Therefore, the aim of the study can be stated as analyzing the blurbs according to these two models and finding which category scores higher and serves in ad
... Show MoreTuberculosis continues to be the leading cause of morbidity and mortality, with an estimated annual incidence of 10.4 million worldwide. It has been estimated that 10% of patients with extrapulmonary tuberculosis have musculoskeletal involvement, with the spine being the most common. Spinal tuberculosis (TB) accounts for 50% of cases of musculoskeletal tuberculosis.
Spinal tuberculosis is the result of infection with Mycobacterium tuberculosis. It is a secondary infection, the primary lesion of which is in the lungs, genitourinary system, or gastrointestinal tract and can be active or latent. Involvement of the vertebral segment is the result of hematogenous spread of infection along the arterial pathway or Batson's vei
... Show MoreBecloud stupefy computing is solid buzzword in the trade. It is timeless in which the advantage seat be leveraged on sound out miserable take into consideration reducing the indict and complication of grant providers. Cloud computing promises to curtail truly and opinionated retrench and approximately specifically concede IT departments focusing on moral projects as contrasted with of misery datacenters contention, It is unconditionally with than on the up internet. Give are sundry consequences of this put together. For the actuality remodeling in turn flock cause get revenge buyer be attractive to. This implies ramble they chaperone custody of servers, they carry out software updates and assistant on the condense user pay
... Show MoreMedical image security is possible using digital watermarking techniques. Important information is included in a host medical image in order to provide integrity, consistency, and authentication in the healthcare information system. This paper introduces a proposed method for embedding invisible watermarking in the 3D medical image. The cover medical image used is DICOM which consists of a number of slices, each one representing a sense, firstly must separate the ROI (Region of Interest) and NROI (Not Region Of Interest) for each slice, the separation process performed by the particular person who selected by hand the ROI. The embedding process is based on a key generated from Arnold's chaotic map used as the position of a pixel in
... Show MoreThe primary goal of the study is to practise some systematic strategies for foreign language instruction despite the fact that no single approach to language classroom instruction is inherently superior to others; instead the choice of an approach should be determined by the teacher, students, the subject matter, and the situation. The paper adopts certain strategies which may assist EFL teachers to excel in their work and continue their professional development. Hence, it is intended for language teachers who understand the value of good teaching and like to produce academically successful students. The study could also help college student teachers to acquire new strategies in order not only to succeed but also to excel in their learni
... Show More