This paper presents an in-depth stylistic analysis of the linguistic artistry andliterary techniques employed by Paulo Coelho in his novel By the River Piedra ISat Down and Wept. A close reading approach guided by stylistics and linguisticsframeworks reveals Coelho's extensive incorporation of imaginative metaphors,vivid imagery, poetic diction, and resonant symbols across the narrative. Analysisspecifically elucidates how Coelho adeptly manipulates various stylistic features toconvey thematic content, shape characterization, and produce aesthetic impacts.Findings provide critical insights into Coelho’s linguistic mastery and contribute toresearch in stylistics and literary linguistics through rigorous examination of anentire contemporary novel
A Longitudinal opening is used to construct hollow core beam is a cast in site or precast or pre stressed concrete member with continuous voids provided to reduce weight, cost and, as a side benefit, to use for concealed electrical or mechanical runs. Primarily is used as floor beams or roof deck systems. This study investigate the behavior of six beams (solid or with opening) of dimension (length 1000 x height 180 x width120mm) simply support under partial uniformly distributed load, four of these beam contain long opening of varied section (40x40mm) or (80x40mm). The effect of vertical steel reinforcing, opening size and orientations are investigated to evaluate the response of beams. The experimental behavior based on load-deflection
... Show MoreComputer literacy is an urgent necessity for university students, given the rapid development in the means of communication in which we live in this era, and the flow of abundant information. Mainly on the computer in all administrative and academic transactions, where first of all the registration for the semester is done through the computer. Computer culture has many characteristics and advantages that distinguish it from other sciences, including the concept of computer culture that cannot be defined absolutely, and it is difficult to define its levels, because the specifications of the computer-educated individual differ from one individual to another, and from time to time also, you find it a luxury in a country What, and you
... Show MoreAbstract
Objective: The purpose of this study is to investigate the family-centered care health services of family-provider partnership in Baghdad/ Iraq.
Methods: A descriptive cross-sectional study is conducted in Baghdad Province. A cluster samples of 440 clients who review family centered care for the purpose of health services. The instruments underlying the study phenomenon deals with client's socio-demographic characteristics and family centered care questionnaire which include (partnership related to decision-making team, supporting the family as the constant in the child’s life, family-to-family and peer support and supporting transition to adulthood). The relia
... Show MoreSpin coating technique used to prepare ZnPc, CdS and ZnPc/CdS blend thin films, these films annealed at 423K for 1h, 2h and 3h. Optical behavior of these films were examined using UV-Vis. and PL. The absorption spectrum of ZnPc shows a decreasing in absorption with the increase of annealing time while CdS spectrum give a clearly absorption peak at~510 nm. Energy gap of ZnPc increases from 1.41 to 1.52 eV by increasing the annealing time. Eg of CdS decrease by increasing annealing time, from 2.3 eV to 2.2 eV. The intensities of the peaks obtained from PL spectra were strongly dependent on annealing time and confirmed the results obtained from UV-Vis. D.C. conductivity measurement showed that all the thin films have two differen
... Show MoreSensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps
... Show MoreIn this study many specimen s were prepared from 2024-T3 Aluminum alloy for corrosion test by the dimensions of (15*15*3) mm according to ASTM G71-31 and then subjected to shot peening process at different time (15, 30, 45) minutes using steel ball having a diameter of 2.75 mm and Rockwell Hardness of 55RC to induce compressive residual stress which were measured using X-Ray diffraction method, surface roughness and hardness were tested before and after peening. Electrochemical corrosion test by Tafel extrapolation method was carried out in an environment of 3 .5% NaCl solutions (sea water) where Corrosion rate calculated using Tafle equation.
The obtained results show a favorable influence of SP treatment
... Show MoreBis-anthraquinones with a unique molecular backbone, (+)-2,2’-epicytoskyrin A (epi) and (+)-1,1′-bislunatin (bis), was produced by endophytic fungi Diaporthe sp GNBP-10 associated with Gambir plant (Uncaria gambier). Epi and bis possess robust antimicrobial activity toward various pathogens. This study focus on knowing the optimum condition of epi and bis production from Diaporthe sp GNBP-10. A series of culture media with various nutrient compositions was investigated in epi and bis production. The content of epi and bis was determined by measuring the area under the curve from TLC-densitometric (scanner) experiment. The linear regression analysis was then applied to obtain the results. The optimi
... Show MoreFuture wireless communication systems must be able to accommodate a large number of users and simultaneously to provide the high data rates at the required quality of service. In this paper a method is proposed to perform the N-Discrete Hartley Transform (N-DHT) mapper, which are equivalent to 4-Quadrature Amplitude Modulation (QAM), 16-QAM, 64-QAM, 256-QAM, … etc. in spectral efficiency. The N-DHT mapper is chosen in the Multi Carrier Code Division Multiple Access (MC-CDMA) structure to serve as a data mapper instead of the conventional data mapping techniques like QPSK and QAM schemes. The proposed system is simulated using MATLAB and compared with conventional MC-CDMA for Additive White Gaussian Noise, flat, and multi-path selective fa
... Show MoreThis paper presents an analytical study on the serviceability of reinforced concrete gable roof beams with openings of different sizes, based on an experimental study which includes 13 concrete gable roof beams with openings under static loading. For deflection and crack widths under static loading at service stage, a developed unified calculation procedure has been submitted, which includes prismatic beams with one opening subjected to flexure concentrated force. The deflection has been calculated with two methods: the first method calculated deflections via relevant equations and the second was Direct Stiffness Method in which the beam is treated as a structural member with several segments constituting the portions with solid sec
... Show MoreFive