This study has applied the theoretical framework of conceptual metaphor theory to the analysis of the source and target domains of metaphors that are used in two English nineteenth century sonnets, both written by contemporaneous female poets. The quantitative and qualitative results of the textual analysis have clearly revealed that Elizabeth Barrett Browning’s sonnet 23 centres around the conceptual mapping of the journey of love and life with that of possession. In contrast, Christina Rossetti’s sonnet Remember tackles the central conceptual mapping of death as a journey in relation to its further experiential connections. In addition, the application of conceptual metaphor theory in identifying the frequencies and densities of metaphors’ conceptual domains has resulted in unravelling the thematic structures of both poems. Discovering such a textually attested relationship between the densities of metaphorical conceptual domains and textual thematic structure has neither been fully explored nor identified before in the genre of English female sonnets.
Unconfined compressive strength (UCS) of rock is the most critical geomechanical property widely used as input parameters for designing fractures, analyzing wellbore stability, drilling programming and carrying out various petroleum engineering projects. The USC regulates rock deformation by measuring its strength and load-bearing capacity. The determination of UCS in the laboratory is a time-consuming and costly process. The current study aims to develop empirical equations to predict UCS using regression analysis by JMP software for the Khasib Formation in the Buzurgan oil fields, in southeastern Iraq using well-log data. The proposed equation accuracy was tested using the coefficient of determination (R²), the average absolute
... Show MoreThis paper discuses the mindset contribution of the organization Science in organizational effectiveness (OE), and the most valuable thoughts they introduced in this subject, starting from the pre- classical era, through classical era to present time. This paper has identified the main contribution in OE. The concept of OE didn’t arise until what had been introduced by Chester Barnard, although Max Weber mentioned this concept in his bureaucratic theory, but he didn’t explain it as Barnard does. After that no clear focus was pointed to this subject until Peter Drucker did so, which considered as the main participant in OE after Barnard. After that many researchers be interested in OE and they start studying this subject like
... Show Moreبناء على ما تقدم يتضح ان القطاع العام والقطاع الخاص ليسا موقفا ايدولوجيا انتقائيا، وانما هو انبثاق من العمود الفقري للصيرورة الرأسمالية القائمة على تقديس الملكية الخاصة، وان الادوار التي يمكن ان يلعباها ليسا منعزلين عن الحركة العامة للاقتصاد في كليته، وليس هما ابنا السياسات الاقتصادية، والبناء الفوقي بقدر ماهما نتاج الحركة الموضوعية وصيرورة التطور الاجتماعي معبرا عنها في تطور علاقات الانتاج وقوى الانتا
... Show MoreTheatrical performances began with the Greeks when the theatrical scenes and skeletal figures were encoded, where the large wall of the Alskina, which contains three doors, the middle of them with a high height, and the two sides took the natural size, where the middle door indicated a symbolism of the god or demigods, as we find the condensation of the symbol in the architecture of the theater, and the symbol was taken In the theatrical scene, the development semantically and aesthetically, and interpreting and interpreting the current day, where the laser light formed the symbolism of the contemporary virtual scene, and in order to identify the aesthetics of the symbol in the theatrical scene, the current research was evaluated into fo
... Show MoreThe study aims to reveal the degree of application of the alternative evaluation strategy in social studies in public education in the Kingdom of Saudi Arabia. It also aims to identify the opinions of experts on how to implement this. The study adopted the mixed methodology, which represented in the descriptive-analytical method, and qualitative methods through the grounded theory. The study used two tools namely: a questionnaire for assessments of social studies teachers and semi-structured interview questions. The results of the study showed a medium degree of appreciation for the application of alternative evaluation strategies by social studies teachers in general education with an average of (2.28). The results also showed that ther
... Show MoreInferential methods of statistical distributions have reached a high level of interest in recent years. However, in real life, data can follow more than one distribution, and then mixture models must be fitted to such data. One of which is a finite mixture of Rayleigh distribution that is widely used in modelling lifetime data in many fields, such as medicine, agriculture and engineering. In this paper, we proposed a new Bayesian frameworks by assuming conjugate priors for the square of the component parameters. We used this prior distribution in the classical Bayesian, Metropolis-hasting (MH) and Gibbs sampler methods. The performance of these techniques were assessed by conducting data which was generated from two and three-component mixt
... Show MoreThe current research aims to identify the " impact of strategic warheads numbered ( NHT) in the collection average second grade students in the article of history). " To achieve this, I assumed the researcher that there is no different between the statistically significant the average score for the collection of experimental group who teaches the Arab Islamic history on and a strategic warheads numbered and the average score for the collection of the control group who were studying the same article according to the classic method ( traditional) . The study sample consisted of 64 students from the second grade average in the secondary warka bin nawfal in the general Directorate for education first karkh in Baghdad for the annual cources 2
... Show MoreThe aim of this research is to use robust technique by trimming, as the analysis of maximum likelihood (ML) often fails in the case of outliers in the studied phenomenon. Where the (MLE) will lose its advantages because of the bad influence caused by the Outliers. In order to address this problem, new statistical methods have been developed so as not to be affected by the outliers. These methods have robustness or resistance. Therefore, maximum trimmed likelihood: (MTL) is a good alternative to achieve more results. Acceptability and analogies, but weights can be used to increase the efficiency of the resulting capacities and to increase the strength of the estimate using the maximum weighted trimmed likelihood (MWTL). In order to perform t
... Show MoreTitanium dioxide (TiO2) thin films were prepared under different pressures with values (15, 30, 60 and 120) Pa using the DC reactive magnetron homemade system with mixed gases of argon and oxygen in ratio (50:50). The result of X-ray diffraction patterns discovered that the structure of the deposited films was polycrystalline, including the phase of anatase. All the appeared peaks were matched to the planes (101), (004), (105), and (211) of diffracted states. Both the intensities and the number of the appeared peaks are declined according to the increased pressure, and the plane of (101) is be considered the preferential grown plane, it is taking a maximum texture factor. Both the lattice constant and the atomic inter-planer spacing take th
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show More