Since the time it emerged, stylistics, as a field of knowledge which combines both linguistics and literature, acquired a special status in the linguistic arena. Its significance in complementing the meaning delivered by linguistic means has been proven and acknowledged through numerous stylistic analytic attempts of different literary works and in different languages. The question put forward in this paper is whether or not the stylistic analysis can work as effectively on translated texts as it does on the original ones without having the results reached by the analysis distorting the meaning of the original text. An attempt to investigate this question is made herein by conducting a lexical stylistic analysis on an extract from Dicken's novel "Tale of Two Cities". The extract is split into two texts, the first is kept in its original language, English, and the second is translated into Arabic. In carrying out the analysis, the researcher will try to find out whether or not the analyses of the two texts complement each other and serve the meaning intended by the author and with no barrier due to translation. The researcher hypothesizes that translation does not affect the meaning derived from the stylistic analysis since all languages enjoy an approximate degree of sophistication provided by the use of linguistic systems of high degree of complexity that allow them to account for different structures in their counterparts.
Objective: Breast cancer is regarded as a deadly disease in women causing lots of mortalities. Early diagnosis of breast cancer with appropriate tumor biomarkers may facilitate early treatment of the disease, thus reducing the mortality rate. The purpose of the current study is to improve early diagnosis of breast by proposing a two-stage classification of breast tumor biomarkers fora sample of Iraqi women.
Methods: In this study, a two-stage classification system is proposed and tested with four machine learning classifiers. In the first stage, breast features (demographic, blood and salivary-based attributes) are classified into normal or abnormal cases, while in the second stage the abnormal breast cases are
... Show MoreThe weather of Iraq has longer summer season compared with other countries. The ambient temperature during this season reaches over 50 OC which makes the evaporative cooling system suitable for this climate. In present work, the two-stage evaporative cooling system is studied. The first stage is indirect evaporative cooling (IEC) represented by two heat exchangers with the groundwater flow rate (5 L/min). The second stage is direct evaporative cooling (DEC) which represents three pads with groundwater flow rates of (4.5 L/min). The experimental work was conducted in July, August, September, and October in Baghdad. Results showed that overall evaporative efficiency of the system (two coils with three pads each
... Show MoreIn this paper, an intelligent tracking control system of both single- and double-axis Piezoelectric Micropositioner stage is designed using Genetic Algorithms (GAs) method for the optimal Proportional-Integral-Derivative (PID) controller tuning parameters. The (GA)-based PID control design approach is a methodology to tune a (PID) controller in an optimal control sense with respect to specified objective function. By using the (GA)-based PID control approach, the high-performance trajectory tracking responses of the Piezoelectric Micropositioner stage can be obtained. The (GA) code was built and the simulation results were obtained using MATLAB environment. The Piezoelectric Micropositioner simulation model with th
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreQuantum channels enable the achievement of communication tasks inaccessible to their
classical counterparts. The most famous example is the distribution of secret keys. Unfortunately, the rate
of generation of the secret key by direct transmission is fundamentally limited by the distance. This limit
can be overcome by the implementation of a quantum repeater. In order to boost the performance of the
repeater, a quantum repeater based on cut-off with two different types of quantum memories is suggestd,
which reduces the effect of decoherence during the storage of a quantum state.
Most companies use social media data for business. Sentiment analysis automatically gathers analyses and summarizes this type of data. Managing unstructured social media data is difficult. Noisy data is a challenge to sentiment analysis. Since over 50% of the sentiment analysis process is data pre-processing, processing big social media data is challenging too. If pre-processing is carried out correctly, data accuracy may improve. Also, sentiment analysis workflow is highly dependent. Because no pre-processing technique works well in all situations or with all data sources, choosing the most important ones is crucial. Prioritization is an excellent technique for choosing the most important ones. As one of many Multi-Criteria Decision Mak
... Show MoreThis study unveils the ideologies of women empowerment encoded in the Mona Lisa Smile movie (2003). It reveals how the stereotypical image of women born only to be wives and do the duties of upbringing and housework is challenged. Katherine Ann Watson (Julia Roberts), the main character in the movie, wants to make a difference in the next generation of women. She rejects the imposed traditional ideologies. Linguistically, she opposes conventional thinking and seeks to persuade her students that life is about more than getting married. The primary focus of this study is to examine and clarify how the characters’ linguistic choices convey their ideologies concerning the notion of women empowerment. To do this, the researchers apply
... Show MoreThirty three specimens of the blue-cheeked bee-eater were collected at central and southern Iraq from April 1997 to October 2000. Two nematodes Hadjelia truncata and Syphaciella capensis, were recovered from the alimentary tract. Reporting these two nematodes represents the first record for Iraq as well as a new host record.
Three-dimensional (3D) reconstruction from images is a most beneficial method of object regeneration by using a photo-realistic way that can be used in many fields. For industrial fields, it can be used to visualize the cracks within alloys or walls. In medical fields, it has been used as 3D scanner to reconstruct some human organs such as internal nose for plastic surgery or to reconstruct ear canal for fabricating a hearing aid device, and others. These applications need high accuracy details and measurement that represent the main issue which should be taken in consideration, also the other issues are cost, movability, and ease of use which should be taken into consideration. This work has presented an approach for design and construc
... Show MoreThis study is an objective literary study of the poems of Abu Dhu'ayb Al-Hudhali and Su'da Bint Al-Shamrdal. It aims to shed light on the philosophy of death in the poems, and the way this philosophy is treated by both poets. Thus, the main prominent poetic images have been addressed and the outstanding ones have been singled out. The study further investigates the intertextuality with other poetic verses and Quranic verses and reviews the deviation in their semantic, syntactic, and phonetic types. The study adopts the historical approach to examine the occasion of the poems by referring to several historical sources that indicate the seniority. It also adopts the and descriptive-analytical approach represented by the use of content anal
... Show More