Conversation analysis has long been the concern of many linguists who work in the field of discourse analysis. In spite of the fact that there are many researches have been done in the field of short stories but up to the researcher knowledge the investigation of the selected short stories has not been studied yet. Hence, this paper aims at answering the following questions: what are the features of children’s short stories language and the differences between short stories of four years old and those of six years old. Hence, the devices used by the story tellers in reciting the short stories should be observed. Thus, the researcher has consulted the models presented by Johnson and Fillmore (2010) to show tenses and sentence structure, and Smith (2008) for conversation analysis.In the light of the analysis according to Johnson and Fillmore (2010), the researcher has reached to the following results: It is clear that simple sentences and past simple tense are used more than the other devises due to the fact that it is the main features of children’s short stories language. The conversation of children’s short stories has also showed that the language of four years old is somehow similar to those of six years old. According to Smith (2008), it is clear that the language of children is similar to those of short stories then it is similar to those of real life conversation.
Soil is a crucial component of environment. Total soil analysis may give information about possible enrichment of the soil with heavy metals. Heavy metals, potentially contaminate soils, may have been dumped on the ground. chromium, nickel and cadmium,
This research aims at making a comparative survey between the dry season in (2017-2018) and the wet season (2018-2019) in Iraq concerning the variation of rainfall and pressure systems responsible for such a difference. In this paper, seven climatological stations have been selected: Mosul, Kirkuk, Khanaqin, Baghdad, Rutba, Diwaniyah and Basra. Results have shown that the first category of rainfall of the two seasons has recorded a higher number of rainy days in comparison with the second and third categories with a total of 274 day in a dry season and 403 day of a wet season. Further, the total amount of the annual continuous rain is higher than the total of thunderstorms in a dry season as well as in the
... Show MoreObjectives: The study aims to: (1) assess psychological distress in parents of autistic children, (2) identify the
relationship between psychological distress and parents' socio-demographic characteristics such as (age, marital
status, relationship with child, educational level and monthly income) and (3) identify the relationship between
parent's distress and some of children' socio-demographic characteristics such as (gender, age, birth order and
mean number of children).
Methodology: A descriptive–analytical study that was carried out from December 12th, 2011 to May 1st, 2012.
on a purposive (non- probability) sample of 120 parents (father and mother) who have children with autism and
send their children to the
One hundred of dialysis patients' mean age ( 51.18±8.28) years and one hundred healthy control group , where carried out from different hospitals of Baghdad city , during the period between November /2012 until March/2013. Blood samples were collected before dialyzing for estimation the concentration of urea, creatinine, uric acid, random blood sugar , calcium and cholesterol by enzymatic method detected spectrophotometerically.
The aim of this study is to determine concentration of urea, creatinine, uric acid, RBS , calcium and cholesterol in hemodialysis patients in Baghdad . The results showed that there were highly significant increases (P<0.01) in the mean of creatinine ,
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
PDBN Rashid, International Journal of Professional Studies, 2023

This research aims to know the reality of implementation of Knowledge Management in Saudi Universities Applied in Shaqra University and to study the difficults whish encountered in applying the Knowledge Management approach.
The study investigated the university staff in Shaqra, Thadig, and Huraymila branches, using a questionnaire designed by the researcher to collect the data, sample of (260) members was used, applying the descriptive analytical approach to test the hypothesis by using (SPSS) program.
The study revealed that the first four zero hypothesis are rejected because there is medium approval of the university members on the fo
... Show MoreExposure to lead results in significant accumulation in most of vital organs, and free radical damage has been proposed as a cause of lead-induced tissue damage, where oxidative stress is a likely molecular mechanism. This study was designed to evaluate therapeutic effects of melatonin in lead-induced organ toxicity in rats. The therapeutic effects of melatonin on lead induced toxicity in rats were evaluated using 36 rats, which were allocated into 3 groups and treated as follows: Group I, includes 12 rats injected subcutaneously with 0.2 ml physiological saline for 30 days, followed by treatment with a daily dose of 20mg/kg melatonin, administrated I.P for the successive 30 da
... Show More