Comparison is the most common and effective technique for human thinking: the human mind always judges something new based on its comparison with similar things that are already known. Therefore, literary comparisons are always clear and convincing. In our daily lives, we are constantly forced to compare different things in terms of quantity, quality, or other aspects. It is known that comparisons are used in literature in order for speech to be clear and effective, but when these comparisons are used in everyday speech, it is in order to convey the meaning directly and quickly, because many of these expressions used daily are comparisons. In our research, we discussed this comparison as a means of metaphor and expression in Russian and Arabic. We have explained in detail the types of comparisons (metaphorical and objective), their structure and main functions. We also analyzed the comparative constructions of Russian and Arabic linguistic units.
This study aimed at the investigation of abnormal liver and renal functions by biochemical manifestations of underlying metabolic abnormalities in relation to hyperglycemia in non-insulin-dependent diabetic patients. The study comprised 118 diabetic patients (56 males, 62 females) and 60 age-matched healthy non-diabetic controls (30 males, 30 females). All subjects were tested for serum levels of liver enzymatic indicators, which include aspartate transaminase (AST), alanine transaminase (ALT), and alkaline phosphatase (ALP), as well as non enzymatic parameters, including total bilirubin and total proteins.Also, serum levels of renal function markers, including microalbumin, creatinine, urea, and uric acid were measured.
The find
... Show MoreThe paper is concerned with posterior analysis of five exponentiated (Weibull, Exponential, Inverted Weibull, Pareto, Gumbel) distrebutions. The expressions for Bayes estimators of the shape parameters have been derived under four different prior distributions assuming four different loss functions. The posterior predictive distributions have been obtained, and the comparison between estimators made by using the mean squared errors through generated different sample sizes by using simulation technique. In general, the performance of estimators under Chi-square prior using squared error loss function is the best.
The subject of Iranian no clear program and the Russian Attitude from it, regard as an important matter in international relations, really it was remarkable and distinctive position towards.
The development of Iranian no clear program in this study we treated Three sides.
The firs the collapse of USSR and its effect of Iran while the second aspect concentrate on the nature of Iranian- Russia Relation, the Third side research the Russia A attitude from
Iranian nuclear program, briefly this attitude is represented by positive, supporting and predication but in the sometime focused on Russian interests in the region of Middle East.
In this research paper, we explain the use of the convexity and the starlikness properties of a given function to generate special properties of differential subordination and superordination functions in the classes of analytic functions that have the form in the unit disk. We also show the significant of these properties to derive sandwich results when the Srivastava- Attiya operator is used.
The linguistic researcher reads a systematic crisis, idiomatic problems within the linguistic term coming to the Arab culture. Where most of them return back to problems of receiving these sciences which are represented by phenomena like the multiplicity linguistic term, disturbance translated idiomatic concept and its duality.
Aims of the research :
1-Initializing new textbooks to form linguistic project and Arabic linguistic theory.
2-Determination adjusted knowledge, concepts of Arabian heritage linguistics subject
3-Observation the causes of disturbance crisis of linguistic term and its relation to
... Show MoreThe aim of this paper is to approximate multidimensional functions by using the type of Feedforward neural networks (FFNNs) which is called Greedy radial basis function neural networks (GRBFNNs). Also, we introduce a modification to the greedy algorithm which is used to train the greedy radial basis function neural networks. An error bound are introduced in Sobolev space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result is published in [16]).
In this paper, wireless network is planned; the network is predicated on the IEEE 802.16e standardization by WIMAX. The targets of this paper are coverage maximizing, service and low operational fees. WIMAX is planning through three approaches. In approach one; the WIMAX network coverage is major for extension of cell coverage, the best sites (with Band Width (BW) of 5MHz, 20MHZ per sector and four sectors per each cell). In approach two, Interference analysis in CNIR mode. In approach three of the planning, Quality of Services (QoS) is tested and evaluated. ATDI ICS software (Interference Cancellation System) using to perform styling. it shows results in planning area covered 90.49% of the Baghdad City and used 1000 mob
... Show MoreImage pattern classification is considered a significant step for image and video processing. Although various image pattern algorithms have been proposed so far that achieved adequate classification, achieving higher accuracy while reducing the computation time remains challenging to date. A robust image pattern classification method is essential to obtain the desired accuracy. This method can be accurately classify image blocks into plain, edge, and texture (PET) using an efficient feature extraction mechanism. Moreover, to date, most of the existing studies are focused on evaluating their methods based on specific orthogonal moments, which limits the understanding of their potential application to various Discrete Orthogonal Moments (DOM
... Show MoreThe sending of information at the present time requires the speed and providing protection for it. So compression of the data is used in order to provide speed and encryption is used in order to provide protection. In this paper a proposed method is presented in order to provide compression and security for the secret information before sending it. The proposed method based on especial keys with MTF transform method to provide compression and based on RNA coding with MTF encoding method to provide security. The proposed method based on multi secret keys. Every key is designed in an especial way. The main reason in designing these keys in special way is to protect these keys from the predication of the unauthorized users.