Language as a means of communication has long been the concern of many conversation analysts in their studies such as: Sacks et al. (1974), Schegloff et al. (1977), Duncan (1972), Grice (1975) and Burton (1980). Burton has attempted analyzing the first ten transitions of the play “The Dumb Waiter” for mere a presentation of her approach. This paper aims at analyzing the conversational structure of forum on the subject of literary fiction and genre fiction by applying Burton’s model (1980) of analysis to answer the question to what extent this model is applicable in analyzing the presented text. The findings of the investigation have proved the applicability of the structure of conversation formulated by Burton (1980) in her model without modification.
Presentation of urinary calculus ranges from painful urination to acute retention. Diagnosed by x-ray pelvis and non-contrast CT and removal of stone by various methods is the management. Variety in symptoms, sometimes make clinical diagnosis difficult until radiological investigations confirm it. In this case presentation, initial diagnosis was made of Urethrocutaneous fistula may be due to distal stricture, but on investigating, he was diagnosed as urethral calculus in urethral diverticulum , as the reason for his symptoms
Transport is a problem and one of the most important mathematical methods that help in making the right decision for the transfer of goods from sources of supply to demand centers and the lowest possible costs, In this research, the mathematical model of the three-dimensional transport problem in which the transport of goods is not homogeneous was constructed. The simplex programming method was used to solve the problem of transporting the three food products (rice, oil, paste) from warehouses to the student areas in Baghdad, This model proved its efficiency in reducing the total transport costs of the three products. After the model was solved in (Winqsb) program, the results showed that the total cost of transportation is (269,
... Show MoreThe Mannich reaction is one of the most important types of organic chemistry fundamental reactions. It is a crucial stage in the production of various medicines, natural goods, and industrial chemicals. Chemists' imaginations have always been piqued because of this. In general, the Mannich reactions can be used as part of a tandem reaction sequence to produce complex target molecules in an elegant and often easy manner. The following article examines and summarizes methods for synthesizing Mannich derivatives, in addition to offering a survey of recent advancements in several fields’ applications of the Mannich reaction, such as biological applications, antimicrobial activity, anticancer activity, anti-inflammation and
... Show MoreSpinal dysraphism is the incomplete fusion of the neural arch, which can be seen as an occult or open neural tube defect. Meningoceles are a form of open neural tube defect characterized by cystic dilatation of the meninges containing cerebrospinal fluid without the involvement of neural tissue. Neurosurgical intervention is necessary in the newborn period since survival in advancing ages is often impossible. Therefore, meningoceles are rarely reported in adulthood. Here, we discussed a case of a 23-year-old female who presented with a meningocele in the lumbosacral area since birth, which had not been operated on. Surgical management and intraoperative findings are also discussed.
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show More