Language as a means of communication has long been the concern of many conversation analysts in their studies such as: Sacks et al. (1974), Schegloff et al. (1977), Duncan (1972), Grice (1975) and Burton (1980). Burton has attempted analyzing the first ten transitions of the play “The Dumb Waiter” for mere a presentation of her approach. This paper aims at analyzing the conversational structure of forum on the subject of literary fiction and genre fiction by applying Burton’s model (1980) of analysis to answer the question to what extent this model is applicable in analyzing the presented text. The findings of the investigation have proved the applicability of the structure of conversation formulated by Burton (1980) in her model without modification.
The concept of Cech fuzzy soft bi-closure space ( ˇ Cfs bi-csp) ( ˇ U, L1, L2, S) is initiated and studied by the authors in [6]. The notion of pairwise fuzzy soft separated sets in Cfs bi-csp is defined in this study, and various features of ˇ this notion are proved. Then, we introduce and investigate the concept of connectedness in both Cfs bi-csps and its ˇ associated fuzzy soft bitopological spaces utilizing the concept of pairwise fuzzy soft separated sets. Furthermore, the concept of pairwise feebly connected is introduced, and the relationship between pairwise connected and pairwise feebly connected is discussed. Finally, we provide various instances to further explain our findings.
In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreThe research work is "The passive voice as a grammatical phenomenon in four selected textbooks". The research deals with the grammatical phenomenon passive in German. The research consists of two parts, the theoretical and the empirical part. The present research work is divided into 3 sections:
The first section includes the definition of passive, passive types, process passive, state passive, passive with modal verbs, and other types of passive. The second section provides illustrations of the four selected textbooks. The third chapter presents the passive voice in textbooks, namely German language teaching for foreigners by Dora Schulz and Heinz Griesbach, Delfin von Aufderstrasse H. and others, Em von Balme, M. and others and
... Show MoreWith the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show MoreBackground: Breast cancer is the commonest type of malignancy worldwide and in Iraq. It is a serious disease that affects the general health and cause systemic changes that affect the physical and chemical properties of saliva leading to adverse effects on oral health. This study was conducted toassess the tumor marker CA15-3 and selected elements in saliva and their relation to oral health status among breast cancer patients compared to control group. Materials and Methods: The total sample consisted of 60 women aged 35-45 years. 30 women were newly diagnosed with breast cancer before taking any treatment and surgery (study group) and 30 women without clinical signs and symptoms of breast cancer as a control group. Dental caries was record
... Show MoreIn the present paper, the researcher attempts to shed some light on the objective behind inserting some Qur'anic verses by Al-Zahraa (Peace Be Upon Her) in her revered speech. Besides, it tries to investigate the hidden meaning of these verses and to study them in the light of pragmaticreferences. This task is supported by Books of Tafseer as well as the books that explained this speech to arrive at its intended meaning. It is possible say that this is astep towards studying speeches of 'Ahlul Bayt' (People of the Prophet's household) in terms of modern linguistic studies, as well as employing modern methods to explore the aesthetic values of these texts.
Hepatitis, an inflammation of the liver, has a number of infectious and non-infectious causes. Two of the viruses that cause hepatitis (hepatitis A and E) can be transmitted through water and food; hygiene is therefore important in their control. First, to assess the importance of HAV and HEV as a possible diagnosis for clinically diagnosed patients with acute viral hepatitis. Second, to assess the prevalence of hepatitis A and E in all provinces of Iraq and study its association with age, gender. This study consisted of two groups: The first group consisted of 2975 patients with a clinical diagnosis of acute viral hepatitis. The second group consisted of a total of 9610 persons, which were recruited by surveying a nationally representative
... Show MoreThis study attempts to provide an approach analysis for the news, depending on the bases and principles which conceptuality semiotic researchers of this field first of them «A. J. Gremas» for the theory of «narrative discourse analysis», to more clarify we tried to apply it on a published press- news, to concludes the most important steps and methods that are necessary to follows gain more understanding of the press- news.