One of the main aims of Metrical Phonology Theory (MTT) is to provide the stress of poetry on the syllable, the foot, and the phonological word levels. Analyzing poetry embodies one of the most prominent and controversial metrical issues as the subsumed number and types of syllables, feet, and meters are balanced compared to other literary texts. The MTT saw the light during the late seventies (1975) and (1977) by Liberman and Prince, who produced it as part of non-linear phonology. Its roots originated in prosody, which studies poetic meter and versification. The basis of the metrical analysis is the prosodic analysis developed in London by Firth and his students in 1950. This study aims to identify the values of five metrical parameters in modern English poetry. To achieve this aim, the first five lines of Tennyson's poem 'The Charge of the Light Brigade' are decided to pass through by examining the five metrical parameters along with Pearl et al. (2009). These five parameters are: Quantity Sensitivity, Extrametricality, Foot- Directionality, Boundedness, and Foot- Headedness. The drawn conclusions have shown: Quantity Sensitive, Extrametrical, Foot- Directionality- Left, Bounded, and Foot- Headed- Left values.
The current study performed in order to detect and quantify epicatechin in two tea samples of Camellia sinensis (black and green tea) by thin layer chromatography (TLC) and high performance liquid chromatography (HPLC). Extraction of epicatechin from black and green tea was done by using two different methods: maceration (cold extraction method) and decoction (hot extraction method). Qualitative and quantitative determinations of epicatechin in two tea samples were investigated. Epicatechin identification was made by utilizing preliminary chemical tests and TLC. This identification was also boosted by HPLC and then quantified epicatechin in all ethyl acetate fractions of two tea samples. This research revealed the existence of epica
... Show MoreThis research on women under the title (Empowerment of women… From value education to the creation of human morality), includes a disclosure of the reasons that prevented women from performing their human role in the development of human societies and treatments that can provide to solve this big problem in the life These communities, especially the Eastern societies and the religious ones, believe that the woman has not received the care and care to raise her human values in order to contribute to the required social contribution, for historical, economic, moral, religious, social and cultural reasons. And by shedding light on specific definitions of the most important rules on which the research relied
... Show MoreNumerical simulations are carried out to evaluate the coherence concept’s effect on the performance regarding the optical system, when observing and imaging the planet’s surface. In numerous optical approaches, the coherence qualities of light sources play an important role. This paper provides an overview about the mathematical formulation of temporal and spatial coherence and incoherence properties of light sources. The circular aperture was used to describe the optical system like a telescope. The simulation results show that diffraction-limited for incoherent imaging system certainly improves the image. Yet, the quality of the image is degraded by the light source's highly spatial and temporal coherence properties, resulting in a
... Show MoreThe research sought to identify the objective trends of postgraduate students at the College of Political Science - University of Baghdad for the period from 2000-2012 through the objective trends of university theses and dissertations and what are the most and least studied topics, with a re-adjustment of previously studied topics towards topics that serve issues of concern to society and avoiding topics that have been studied a lot to avoid repetition. The research came out with the following results, the most prominent of which are: The total number of what was accomplished in this college is 401 theses and dissertations, and the dissertations had the largest share of them, as their percentage reached 69%, with 275 theses compared to 126
... Show MoreIn this paper, some series of new complexes of Mn(II), Co(II), Ni (II) Cu(II) and Hg(II) are prepared from the Schiff bases (L1,L2). (L1) derived from 4-aminoantipyrine and O-phenylene dia mine then (L2) derived from (L1) and 2-benzoyl benzoic acid. Structural features are obtained from their elemental microanalyses, molar conductance, IR, UV–Vis, 1H, 13CNMR spectra and magnetic susceptibility. The magnetic susceptibility and UV–Vis, IR spectral data of the ligand (L1) complexes get square–planar and tetrahedral geometries and the complexes oflig and (L2) get an octahedral geometry. Antimicrobial examinations show good results in the sharing complexes.
We present a simple model of charge transfer current through sensitizer N3 molecule contact to TiO2 and ZnO semiconductors to calculate the charge transfer current. The model underlying depends on the fundamental parameters of the charge transfer reaction and it is based on the quantum transition theory approach. A transition energy, driving energy and potential barrier have been taken into account charge transfer current at N3 / TiO2 and N3 / ZnO devices with wide polarity solvents Acetic acid, 2-Methoxyethanol, 1-Butanol, Methyl alcohol, chloroform, N,N-Dimethylacetamide and Ethyl alcohol via the quantum donor-acceptor system.The effects of the transition energy and potential barrier are computed and discussion on charge transfer current.
... Show MoreThe global globalization the world is experiencing has enabled international actors—states, international governmental and non-governmental organizations, such as liberation movements, international social movements, and even terrorist organizations—to use cyber power to achieve their goals. Therefore, this study discusses the impact of information power on the domestic environment of the United States.
Among all the common mechanical transmission elements, gears still playing the most dominant role especially in the heavy duty works offering extraordinary performance under extreme conditions and that the cause behind the extensive researches concentrating on the enhancement of its durability to do its job as well as possible. Contact stress distribution within the teeth domain is considered as one of the most effective parameters characterizing gear life, performance, efficiency, and application so that it has been well sought for formal gear profiles and paid a lot of attention for moderate tooth shapes. The aim of this work is to investigate the effect of pressure angle, speed ratio, and correction factor on the maxi
... Show MoreObjectives: The purpose of this in vitro study was to compare the effect of adding a poloxamer surfactant to the irrigant solutions on its cleaning efficiency. Design: In this study the roots of extracted permanent premolar teeth were used and evaluated by using Scanning Electronic Microscopy (SEM). Materials and Method: 72 human single tooth of permanent premolar (8 for each group) were used in this in vitro study. Roots after sectioning at cervical area to get 15 mm were embedded in a plastic container filled with impression silicon, then instrumented with ProTaper rotary instruments till size F4. Each group (8 root) were irrigated with one of the nine solutions used in study: three concentrations of NaOH [5% (A1), 2.5%(A2), 0.5%(A3)], th
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show More