This article discusses some of the metaphorical use of language units. Here we will define the basic concepts and underline the causes of this phenomenon. Through research it is proven that through the application of names of some body parts achieves the variety of metaphorical meanings.
Background Immunological gene and serum level for interleukin- 9 rs 17317275 have been established to have linked to predisposition systemic lupus erythematosus (SLE) and its severity. SLE is a severe, systemic autoimmune disease characterized by autoantibody generation, complement activation, and immune complex deposition. In the pathophysiology of SLE, cytokines have a pleiotropic function. Recently, IL-9 was discovered to mediate strong anti-inflammatory effects in numerous cells or experimental autoimmune models. Objective This study aimed to determine the role of age, IL-9 serum level and genetic polymorphism, C-reactive protein (CRP), Anti-nuclear antibody (ANA) and Anti- double-stranded DNA (anti-dsDNA) to recognize SLE pathogenesis.
... Show MoreThe Concept of the Constitution and the most Important of Human Rights
The aim of this research is to find out why some matrix verbs are no longer complemented by the two types of infinitive clauses as it is the case in Elizabethan English . At that time (when Shakespeare was writing ), the same matrix verb triggers the two types of infinitive clauses as its complex transitive complementation .Such free variation is not possible in Present –Day English . In this corpus – based study , it is shown that the choice of the form of the infinitive clause is not free; there are certain syntactic ,sem- antic constraints that dete, - infinitive.
The research aims to focus on the human rights guarantees as they are subjected to continuous violations due to changes, wars and conflicts between nations and people, especially in the Arab world and the third world due to political, social, economic and environmental conditions and the failure of democratic tracks under the current reality.
Keyword: Human rights, Reality, Ambition.
Electric Quadrupole transitions are calculated for beryllium isotopes (9, 10, 12 and 14). Calculations with configuration mixing shell model usually under estimate the measured E2 transition strength. Although the consideration of a large basis no core shell model with 2ℏtruncations for 9,10,12 and14 where all major shells s, p, sd are used, fail to describe the measured reduced transition strength without normalizing the matrix elements with effective charges to compensate for the discarded space. Instead of using constant effective charges, excitations out of major shell space are taken into account through a microscopic theory which allows particle–hole excitations from the core and model space orbits to all higher orbits
... Show MoreThe reaction of 2, 4, 6-trihydroxyactophenonemonohydrate with hydrazine monohydrate was realized under reflux in methanol and a few drops of glacial acetic acid were added to give the (intermediate) 2-(1-hydrazono-ethyl)-benzene-1, 3, 5-triol, which reacted with salicylaldehyde in methanol to give a new type (NO) ligand [HL][(2-1-[(2-hydroxy-benzyliidene)-hydrazono]-ethyl) benzene-1, 3, 5-triol. The ligand was reacted with Mcl.(where M-Co, Ni, Cu, and Zn) under reflux in methanol with (l: 1) ratio to give complexes of the general formula [M (HL)]. All compounds have been characterized by spectroscopic methods I" H NMR, IR. UV-Vis, HPLC, atomic absorption] microanalysis along with conductivity measurement. From the above data the proposed mo
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show More