This research is an attempt to study aspects of syntactic deviation in AbdulWahhab Al-Bayyati with reference to English. It reviews this phenomenon from an extra-linguistic viewpoint. It adopts a functional approach depending on the stipulates of systemic Functional Grammar as developed by M.A.K. Halliday and others adopting this approach. Within related perspective, fairly’s taxonomy (1975) has been chosen to analyze the types of syntactic deviation because it has been found suitable and relevant to describe this phenomenon. The research hypothesizes that syntactic deviation is pervasive in Arabic poetry, in general and in Abdul-Wahhab Al-Bayyati Poetry in specific, and can be analyzed in the light of systemic Functional Grammar. It also hypothesize that syntactic deviation intensifies cohesion in poetic texts and does not disrupt or dismantle links between the structures of the clause. The devices tackled in this research are: ellipsis, repetition, functional shift, and thematization
The study explores the use of ergative verbs in constructing clauses and their impact on the backgrounding of the agent's role in two selected short stories. Contrary to hypothesis No. 1, the research indicates that changes in sentence patterns don't affect the meaning of the process. Additionally, hypothesis No. 2 is refuted as the middle structure is found to highlight the agent's role in the science fiction short story, Terra Infirmum, rather than concealing it as hypothesized for "The Invisible Man." The analysis uncovers that writers utilize ergative processes to narrate stories in various ways, including transitive/active voice, intransitive/active voice, and transitive/passive voice. Furthermore, the findings suggest that writers emp
... Show MoreAryl hydrocarbon receptor (AhR) is a ligand-activated transcription factor and 2,3,7,8-tetrachlorodibenzo-p-dioxin (TCDD) is a potent ligand for AhR and a known carcinogen. While AhR activation by TCDD leads to significant immunosuppression, how this translates into carcinogenic signal is unclear. Recently, we demonstrated that activation of AhR by TCDD in naïve C57BL6 mice leads to massive induction of myeloid derived-suppressor cells (MDSCs). In the current study, we investigated the role of the gut microbiota in TCDD-mediated MDSC induction. TCDD caused significant alterations in the gut microbiome, such as increases in Prevotella and Lactobacillus, while decreasing Sutterella and Bacteroides. Fecal transplants from TCDD-treated
... Show MoreThis research reveals the treatment mechanisms followed in the media for covering the topic of displacement and captivity of Yazidi in the Iraqi press, through studying all the publishing in one of the Iraqi newspapers concerning the research subject. The research problem is in the following questions:
- What are the journalistic arts that are tackled by the newspaper concerning the subject of the Yazidi women?
- What are the editing forms for the model of the press subjects that have been employed about the event and what are its sources?
- What are the highlighting means used in presenting the subjects within the journalistic arts?
- What are the i
Comparative Study Between Glimepiride and Glibenclamide in the Treatment of Type 2 Diabetic Patients in Al-Yarmouk Hospital
the researchers Sought to determine the impact of the customer contact (Within a client contact there are two times, first is the total time required to create a service and within it there is contact time while the second time is the time of client contact ؛ where means a time that records the physical presence of the customer during the process of service) on operations performance by concentrate attention on the cost (labor productivity) and quality (patient ratio to the doctor) and speed (cycle time) and flexibility (the flexibility range) , as well as ruling out variable of innovation because of impossibility to measure this variable in the Specialty Center for Dental in al-alwia due to the center is lacking of mechanisms t
... Show MorePraise be to God, Lord of the Worlds, and prayers and peace be upon the most honorable of creation, Muhammad, whom God sent as a mercy to the worlds, and his pure God and his faithful companions. The Islamic heritage was replete with texts issued from among the pure infallibility, which constituted a prominent teacher that takes the student to stop there in search of its goals, purposes and beauty. The choice was made from those texts that were issued by the imams of Muslims in the Abbasid era, namely Imam Muhammad al-Jawad, his son Imam Ali al-Hadi and his grandson Imam Hassan Zaki al-Askari. (Peace be upon them), and scholars have called them (sons of satisfaction), and researchers have shed light on these texts from rhetorical, artistic
... Show MoreIn this research, the problem of ambiguity of the data for the project of establishing the typical reform complex in Basrah Governorate was eliminated. The blurry of the data represented by the time and cost of the activities was eliminated by using the Ranking function and converting them into normal numbers. Scheduling and managing the Project in the Critical Pathway (CPM) method to find the project completion time in normal conditions in the presence of non-traditional relationships between the activities and the existence of the lead and lag periods. The MS Project was used to find the critical path. The results showed that the project completion time (1309.5) dinars and the total cost has reached (33113017769) dinars and the
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreAbstract. Shatt Al-Arab River was the most important tide river in Iraq, it suffered from neglect and lack of maintenance in the past decades. The river embankment is constantly exposed to erosion processes due to several factors, one of the most important of these factors is the movement of water currents due to the tidal energy coming from the Arabian Gulf. In this study, one dimension unsteady-state model was implemented to study river flood capacity simulation by using HEC-RAS (5.0.7) software in Shatt Al Arab River and its tributaries. The data included flow rate, water level records were collected daily from 2018 to 2020 at different stations along the mentioned river and its feeders, additionally, the considered flood discharge data
... Show More