The present paper studies the use of adjectives in Shakespeare's Sonnets (4, 5, 6, & 9), which are chosen randomly, on the three levels: grammar, lexis and conversation. It tackles adjectives as a literary term with presenting their forms and functions. The presentation is done according to the themes, their forms and functions in conversation, the adjectives are shown in this paper as for their forms, frequency and meanings in the sonnets and their effects on studying. The analysis is done according to Quirk et al. (1985) and Quirk and Greenbaum (1973). Then, all adjectives have been calculated in the sonnets. The results of the analysis have shown that compound adjectives which occurred (31) are used more than the Suffixation and Prefixation as (13) and (8) respectively. The paper shows that there is a clear relation between adjectives and the thematic structure of the sonnets. The presentation of adjectives proves Shakespeare's witty ways to use them in a method that equals various themes. Moreover, they are used precisely and accurately to transmit themes and have pedagogical effects in conversation.
Abstract The success of the system of government in any country needs to have a handle on the amount of power efficiency , capacity , capability and wisdom, Iraq has gone through since its inception through several stages of time, namely: The first stage: which ran from August 23, 1921 until July 14, 1958 and was ruling monarchy (rule of the royal family) and punishing power of political elites both of them and works access to power without taking into consideration the laws and principles of the Constitution, and as a result of the inability of civilian powers and political parties access to power to grant that army officers regulatory and disciplinary specifications as well as possessing arms and overthrow the rule of the minority coup
... Show MoreGestational diabetes mellitus (GDM) is a growing health concern that usually appears during the second and third trimester stage of pregnancy and is characterized by carbohydrate intolerance of variable severity. The aim of the present study was to scrutinize the relationship between the G972R polymorphism of the insulin receptor substrate-1 (IRS-1) gene with GDM in the Iraqi female population. One hundred and twenty of blood samples taken from healthy women (control) and women with gestational diabetes mellitus in 3rd trimester stage of pregnancy, fasting blood glucose (FBG) and HbA1c% measured to diagnose GDM, lipid profile (cholesterol, triglyceride, HDL, LDL, and VLDL), insulin concentration, insulin resistance and beta cell function to
... Show MoreMost of the literature on the management and application terkzat waved the last period on large organizations was the negligence of knowledge management in small organizations where research aims to find out knowleddge management, small projects In oxygen Ahli plant in Iraq, and the fact the role of knowledge management in small projects from the standpoint of employees in order to achieve this used production method results. The results showed that knowledge management has a role in the high level of productivity during the years 2010-2013. The results showed that knowledge management has a role in the high level of productivity during the years 2
... Show MoreBackground: Iron homeostasis is crucial to many physiological functions in the human body, such as cellular activity, erythropoiesis, and the innate immune response. Iron deficiency anemia may occur from obesity's ability to disturb iron homeostasis. Obesity may be seen as a pre-inflammatory condition with mild, ongoing systemic inflammation. Additionally, an increase in hepcidin levels by chronic inflammation causes iron insufficiency in obese people. For this reason, this current experiment is designed to investigate the iron profile and some hematological and inflammatory parameters in obese adults in the Kurdistan region-Iraq.
Subjects and Methods: The cross-sectional study w
... Show MoreBackground: Melanin pigmentation of the gingiva appears in all ethnicities. Excessive pigmentation is an esthetic concern that has increased awareness about depigmentation procedures. This epidemiological study aims to find the correlation between skin color and gingival pigmentation in Sulaimani Governorate, Kurdistan/Iraq.
Subjects and Methods: A total of 820 apparently healthy and non-smokers, including 338 males and 482 females with healthy gingiva, aged between (18-40 years old) were enrolled in this study. Clinical examination on the participants’ gingivae was performed to assess color, and the distribution of pigmentations. Afterward the of participants skin color were
... Show MoreMicroorganisms establish both structural and functional construction in the marine environment, despite scientific advances, the identification of marine bacterial species is still considered as a common challenge in microbiology. Nevertheless, the present study aims to make an effort, although it seems modest, but it could establish a basis for studying the bacterial diversity in the Iraqi marine area, because of what this aspect entails of the poverty of studies related to this aspect in the studied area. The current results show the marine studied area are classified within worming area, where the average temperature ranged from 23.17 to 26.17 ºC. The recorded number of bacteria was increased with temperature increasing (0.210, 0.250
... Show MoreObjectives: The study aims to: (1) assess psychological distress in parents of autistic children, (2) identify the
relationship between psychological distress and parents' socio-demographic characteristics such as (age, marital
status, relationship with child, educational level and monthly income) and (3) identify the relationship between
parent's distress and some of children' socio-demographic characteristics such as (gender, age, birth order and
mean number of children).
Methodology: A descriptive–analytical study that was carried out from December 12th, 2011 to May 1st, 2012.
on a purposive (non- probability) sample of 120 parents (father and mother) who have children with autism and
send their children to the
Iraq has the distinction of being a great potential of non-renewable natural resources,
especially crude oil and natural gas. Since the discovery of crude oil at the beginning of the
twentieth century in Iraq. Although the different of investment types, it contributed to the oil
sector in the provision of financial resources to the state treasury , since that date until the
present time.
Search has been marked by division ((The foreign investment in the oil sector in Iraq after
2003)) into three sections. The first section included a brief history of the development of
Iraq's oil potential in terms of oil reserves, and oil fields, and the quantities of production and
export. The second section reviewed the investm
Background :The cotton factories have difference steps, spinning and weaving are van important parts of the factories. Cotton industry workers are exposed to various hazards in the different departments of textile factories. The major health problems associated with cotton dust are respiratory problems. Cotton workers display an excess of lung function abnormalities when compared to a community control population.
Aim of Study: This study assessed the effect of exposure to cotton dust in spinning and weaving workers on the lung function in Iraq, by measuring Forced Vital Capacity (FVC),Forced Expiratory Volume in the first second(FEV1), FEV1 ∕ FVC Ratio, and Forced Expiratory Flow 50%(FEF50%),with varying degree of reduction in lung
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the