It is a well-known fact that publishing companies spend much money, time and energy in designing their book covers to attract potential customers. As the first thing people do when they buy or intend to buy a book is looking at its front cover. However, if there is a need to know more about the book, people usually look at the information on its back cover. This paper attempts to explore the persuasive function of blurbs beyond the constraints of the academic domain and consequently their connection with advertising discourse in two main sections: The first presents the concept of blurb and its structure while the second defines persuasion and shows the most prominent strategiesused in blurbs. Finally, this paper gives the conclusion tha
... Show MoreThis research deals with the fact that arts exit from their familiar context in practice and enter in the context of the fantasy and exoticism picture. In order to understand the theatrical phenomenon and know the way of its production of the fantasy picture, especially the acting performance in its transitions between the real and fantasy. This study consists of: an introduction of the research in which the researcher presented the research problem, importance and objectives.
The theoretical framework dealt with founding a theoretical part for the research consisting of two sections: the first (fantasy: the concept and the working) and the second (techniques of acting perfo
... Show MoreThe latest events in Iraq and notably the fall of Mosul in the summer of 2014 have marked a turning point in The modern history of Iraq. Violent terrorist groups have overrun a vast area comprising of many towns in mid and northern Iraq causing many casualties and mass migration. Despite Iraq’s long history of pain and suffering the events of the second half of the year 2014 have been the most violent ever witnessed. From this point of view the researcher has tried to identify specifically in this time and place the effect these events have had on the Iraqi artist and to understand how the Iraqi artists depicted this violence in their works of art. The research comprises four parts; the first looked at the language used and the and pro
... Show MoreTransient three-dimensional natural convection heat transfer due to the influences of heating from one side of an enclosure filled with a saturated porous media, whereas the opposite side is maintained at a constant cold temperature, and the other four sides are adiabatic, were investigated in the present work experimentally. Silica sand was used as a porous media saturated with distilled water filled in a cubic enclosure heated from the side,using six electrical controlled heaters, at constant temperatures of (60, 70, 80, 90, and 100oC). The inverse side cooled at a constant temperature of (24oC) using an aluminum heat exchanger, consisted of 15 channels feeded with constant temperature water. Eighty thermocouples were used to control t
... Show MoreOsmotin and osmotin-like proteins belong to the PR-5 pathogenesis-related group of proteins and are induced in response to various types of biotic and abiotic stresses in several plant species. Carrot was transformed with a tobacco osmotin gene that encodes a protein lacking the vacuolar-sorting motif that is composed of a 20-amino-acid sequence at the C-terminal end, under the control of the cauliflower mosaic virus 35S promoter, using Agrobacterium-mediated transformation. Transgene integration and expression were confirmed by Southern and western blot analyses, and three selected transgenic lines were evaluated for their ability to tolerate drought stress. Under drought stress conditions, all transformants exhibited slower rates of wilti
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreObjective: To assess of Science Teachers' Awareness towards Communicable Diseases Control in Baghdad City
Primary Schools
Methodology: A descriptive study was conducted, included (100) primary school, (50) in Al-Rassafa sector, and
(50) in Al-Karkh sector, from March 5th 2012 to March 15th 2013, to assess of science teachers' awareness
towards communicable diseases control. A cluster sample of (100) Science teachers (males and females) were
selected, as one teacher from each school. A questionnaire format was used for data collection. The validity of
questionnaire was estimated through a penal of experts related to the field of study, and its reliability was
estimated through a pilot study conducted in (20) schools (