This study has applied the theoretical framework of conceptual metaphor theory to the analysis of the source and target domains of metaphors that are used in two English nineteenth century sonnets, both written by contemporaneous female poets. The quantitative and qualitative results of the textual analysis have clearly revealed that Elizabeth Barrett Browning’s sonnet 23 centres around the conceptual mapping of the journey of love and life with that of possession. In contrast, Christina Rossetti’s sonnet Remember tackles the central conceptual mapping of death as a journey in relation to its further experiential connections. In addition, the application of conceptual metaphor theory in identifying the frequencies and densities of metaphors’ conceptual domains has resulted in unravelling the thematic structures of both poems. Discovering such a textually attested relationship between the densities of metaphorical conceptual domains and textual thematic structure has neither been fully explored nor identified before in the genre of English female sonnets.
In this paper, the optical emission spectrum (OES) technique was used to analyze the spectrum resulting from the (CdO:CoO) plasma in air, produced by Nd:YAG laser with λ=1064 nm, τ=10 ns, a focal length of 10 cm, and a range of energy of 200-500 mJ. We identified laser-induced plasma parameters such as electron temperature (Te) using Boltzmann plot method, density of electron (ne), length of Debye (λD), frequency of plasma (fp), and number of Debye (ND), using two-Line-Ratio method. At a mixing ratio of X= 0.5, the (CdO:CoO) plasma spectrum was recorded for different energies. The results of plasma parameters caused by laser showed that, with t
... Show MoreIn this paper, we characterize normal composition operators induced by holomorphic self-map , when and .Moreover, we study other related classes of operators, and then we generalize these results to polynomials of degree n.
Steganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.
Abstract
This research deals with Building A probabilistic Linear programming model representing, the operation of production in the Middle Refinery Company (Dura, Semawa, Najaif) Considering the demand of each product (Gasoline, Kerosene,Gas Oil, Fuel Oil ).are random variables ,follows certain probability distribution, which are testing by using Statistical programme (Easy fit), thes distribution are found to be Cauchy distribution ,Erlang distribution ,Pareto distribution ,Normal distribution ,and General Extreme value distribution . &
... Show MoreThere are many diseases that affect the arteries, especially those related to their elasticity and stiffness, and they can be guessed by estimating and calculating the modulus of elasticity. Hence, the accurate calculation of the elastic modulus leads to an accurate assessment of these diseases, especially in their early stages, which can contribute to the treatment of these diseases early. Most of the calculations used the one-dimensional (1D) modulus of elasticity. From a mechanical point of view, the stresses to which the artery is subjected are not one-dimensional, but three-dimensional. Therefore, estimating at least a two-dimensional (2D) modulus of elasticity will necessarily be more accurate. To the knowledge of researchers, there i
... Show MoreThis study was done to find a cheap, available and ecofriendly materials that can remove eosin y dye from aqueous solutions by adsorption in this study, two adsorbent materials were used, the shells of fresh water clam (Cabicula fluminea) and walnut shells. To make a comparison between the two adsorbents, five experiments were conducted. First, the effects of the contact time, here the nut shell removed the dye quickly, while the C. flumina need more contact time to remove the dye. Second, the effects of adsorbent weight were examined. The nut shell was very promising and for all used adsorbent weight, the R% ranged from 94.87 to 99.29. However C. fluminea was less effective in removing the dye with R% ranged from 47.59 to 55.39. The thi
... Show MoreThe molluscicidal effects of herbicide 2, 4-D were studied against tow species of freshwater snail Bulinus truncatus and Melanopsis nodosa by short term experiments. Calculated values of lethal concentrations (LC50 and LC100) were maid to two spices for different period of time 24hr, 48hr, 72hr and 96hr. The study had showed that the herbicide 2, 4-D was toxic against the tow species. The toxicity of the herbicide was low or unknown in low concentrations in the first period of exposure 24and 48hr to two spices but it increase gradually with increase period of exposure. The spice of B.truncatus was more tolerant than the M.nodosa. All the individual of M nodosa was death while in B.truncatus the complete death was not appear until finish the
... Show MoreIn this paper, a Bayesian analysis is made to estimate the Reliability of two stress-strength model systems. First: the reliability of a one component strengths X under stress Y. Second, reliability of one component strength under three stresses. Where X and Y are independent generalized exponential-Poison random variables with parameters (α,λ,θ) and (β,λ,θ) . The analysis is concerned with and based on doubly type II censored samples using gamma prior under four different loss functions, namely quadratic loss function, weighted loss functions, linear and non-linear exponential loss function. The estimators are compared by mean squared error criteria due to a simulation study. We also find that the mean square error is
... Show MorePower-electronic converters are essential elements for the effective interconnection of renewable energy sources to the power grid, as well as to include energy storage units, vehicle charging stations, microgrids, etc. Converter models that provide an accurate representation of their wideband operation and interconnection with other active and passive grid components and systems are necessary for reliable steady state and transient analyses during normal or abnormal grid operating conditions. This paper introduces two Laplace domain-based approaches to model buck and boost DC-DC converters for electromagnetic transient studies. The first approach is an analytical one, where the converter is represented by a two-port admittance model via mo
... Show MoreIn this paper, an intelligent tracking control system of both single- and double-axis Piezoelectric Micropositioner stage is designed using Genetic Algorithms (GAs) method for the optimal Proportional-Integral-Derivative (PID) controller tuning parameters. The (GA)-based PID control design approach is a methodology to tune a (PID) controller in an optimal control sense with respect to specified objective function. By using the (GA)-based PID control approach, the high-performance trajectory tracking responses of the Piezoelectric Micropositioner stage can be obtained. The (GA) code was built and the simulation results were obtained using MATLAB environment. The Piezoelectric Micropositioner simulation model with th
... Show More