This study has applied the theoretical framework of conceptual metaphor theory to the analysis of the source and target domains of metaphors that are used in two English nineteenth century sonnets, both written by contemporaneous female poets. The quantitative and qualitative results of the textual analysis have clearly revealed that Elizabeth Barrett Browning’s sonnet 23 centres around the conceptual mapping of the journey of love and life with that of possession. In contrast, Christina Rossetti’s sonnet Remember tackles the central conceptual mapping of death as a journey in relation to its further experiential connections. In addition, the application of conceptual metaphor theory in identifying the frequencies and densities of metaphors’ conceptual domains has resulted in unravelling the thematic structures of both poems. Discovering such a textually attested relationship between the densities of metaphorical conceptual domains and textual thematic structure has neither been fully explored nor identified before in the genre of English female sonnets.
Thirty local fungal isolates according to Aspergillus niger were screened for Inulinase production on synthetic solid medium depending on inulin hydrolysis appear as clear zone around fungal colony. Semi-quantitative screening was performed to select the most efficient isolate for inulinase production. the most efficient isolate was AN20. The optimum condition for enzyme production from A. niger isolate was determined by busing a medium composed of sugar cane moisten with corn steep liquor 5;5 (v/w) at initial pH 5.0 for 96 hours at 30 0C . Enzyme productivity was tested for each of the yeast Kluyveromyces marxianus, the fungus A. niger AN20 and for a mixed culture of A. niger and K. marxianus. The productivity of A. niger gave the highest
... Show MoreOne of the primary problems in internet is security, mostly when computer utilization is increasing in all social and business areas. So, the secret communications through public and private channels are the major goal of researchers. Information hiding is one of methods to obtain a security communication medium and protecting the data during transmission.
This research offers in a new method using two levels to hide, the first level is hiding by embedding and addition but the second level is hiding by injection. The first level embeds a secret message in one bit in the LSB in the FFT and the addition of one kashida. Subtraction of two random images (STRI) is RNG to find positions for hiding within the text. The second level is the in
<p>Combating the COVID-19 epidemic has emerged as one of the most promising healthcare the world's challenges have ever seen. COVID-19 cases must be accurately and quickly diagnosed to receive proper medical treatment and limit the pandemic. Imaging approaches for chest radiography have been proven in order to be more successful in detecting coronavirus than the (RT-PCR) approach. Transfer knowledge is more suited to categorize patterns in medical pictures since the number of available medical images is limited. This paper illustrates a convolutional neural network (CNN) and recurrent neural network (RNN) hybrid architecture for the diagnosis of COVID-19 from chest X-rays. The deep transfer methods used were VGG19, DenseNet121
... Show MoreThe herbal remedy individually or in combination with standard medicines has been used in diverse medical treatises for the cure of different diseases. Pumpkin seed oil is one of the recognized edible oil and has substantial medicinal properties due to the presence of unique natural edible substances. Inflammation is an adaptive response that is triggered by noxious stimuli and conditions, which involves interactions amongst many cell types and mediators, and underlies many pathological processes. Unsaturated fatty acids (UFAs) can influence inflammation through a variety of mechanisms, and have been indicated as alternative anti-inflammatory agents to treat several inflammatory skin disorders. Pumpkin seed oil is rich in (UFAs), that its t
... Show MoreThe increased use of hybrid PET /CT scanners combining detailed anatomical information along withfunctional data has benefits for both diagnostic and therapeutic purposes. This presented study is to makecomparison of cross sections to produce 18F , 82Sr and68Ge via different reactions with particle incident energy up to 60 MeV as a part of systematic studies on particle-induced activations on enriched natNe, natRb, natGa 18O,85Rb, and 69Ga targets, theoretical calculation of production yield, calculation of requiredtarget and suggestion of optimum reaction to produce: Fluorine-18 , Strontium-82 andGermanium-68 touse in Hybrid Machines PET/CT Scanners.
The aim of this paper is to present a weak form of -light functions by using -open set which is -light function, and to offer new concepts of disconnected spaces and totally disconnected spaces. The relation between them have been studied. Also, a new form of -totally disconnected and inversely -totally disconnected function have been defined, some examples and facts was submitted.
The permeability determination in the reservoirs that are anisotropic and heterogeneous is a complicated problem due to the limited number of wells that contain core samples and well test data. This paper presents hydraulic flow units and flow zone indicator for predicting permeability of rock mass from core for Nahr-Umr reservoir/ Subba field. The Permeability measurement is better found in the laboratory work on the cored rock that taken from the formation. Nahr-Umr Formation is the main lower cretaceous sandstone reservoir in southern of Iraq. This formation is made up mainly of sandstone. Nahr-Umr formation was deposited on a gradually rising basin floor. The digenesis of Nahr-Umr sediments is very important du
... Show MoreFacial identification is one of the biometrical approaches implemented for identifying any facial image with the use of the basic properties of that face. In this paper we proposes a new improved approach for face detection based on coding eyes by using Open CV's Viola-Jones algorithm which removes the falsely detected faces depending on coding eyes. The Haar training module in Open CV is an implementation of the Viola-Jones framework, the training algorithm takes as input a training group of positive and negative images, and generates strong features in the format of an XML file which is capable of subsequently being utilized for detecting the wanted face and eyes in images, the integral image is used to speed up Haar-like features calc
... Show MoreEnol-Keto tautomerism in 1-[(E)-1,3-benzothiazol-2-ylazo]naphthalen-2-ol has been studied using the B3LYP functional of density functional theory (DFT) with 6-31G(d,p) basis set. Relative and absolute energies, transition state geometries (TS), dipole moments, entropies, enthalpies and Gibbs free energies, equilibrium constants (KT) and rate of tautomerization (kr) were calculated. Also, the computations of geometries and vibration frequencies for the tautomers were calculated and compared. The results of the calculations showed that the enol form is the most stable form than other isomers, this might be due to intra-hydrogen bonding. The TS1 activation energies for tautomer A ↔ B, ta
... Show MoreIn this paper, the necessary optimality conditions are studied and derived for a new class of the sum of two Caputo–Katugampola fractional derivatives of orders (α, ρ) and( β,ρ) with fixed the final boundary conditions. In the second study, the approximation of the left Caputo-Katugampola fractional derivative was obtained by using the shifted Chebyshev polynomials. We also use the Clenshaw and Curtis formula to approximate the integral from -1 to 1. Further, we find the critical points using the Rayleigh–Ritz method. The obtained approximation of the left fractional Caputo-Katugampola derivatives was added to the algorithm applied to the illustrative example so that we obtained the approximate results for the stat
... Show More