Vocabulary knowledge is characterized by a multidimensional specificity in which phonological, morphological, lexical, synthetic, and semantic preoccupations interact. It is a key component of the speaker's linguistic productivity by building a vocabulary size that enables him/her to communicate successfully. The word can be treated from the aspects of form, meaning, and use, or through the concept of three dimensions (breadth, depth, and fluency). This study aims to devise some strategies for developing the lexicon learning, by describing and measuring the effect of the three dimensions (breadth, depth and fluency) of the vocabulary size in the written expression of preparatory students by answering the following general question: Do the dimensions of the vocabulary size affect the productivity of students secondary education in written expression? This research was based on specific tests (yes/no test, a multiple choice (MC) test, and a written expression test) to measure the vocabulary size of preparatory students, and to ascertain the extent of its influence in developing their written expression. The results demonstrated a strong impact of the dimensions of vocabulary knowledge on student's performance in written expression, and the existence of a gap between what the educational documents stipulated and what students produced in their written expression based on their level at this stage.
In this paper, the three species food chain model on time scales is established. The Monod-Haldane functional response and time delay are considered. With the help of coincidence degree theory, existence of periodic solutions is investigated, which unifies the continuous and discrete analogies.
With the revolution of information technology and Wide Area Networking, data has become less and less private where the access of media as well as the attempts to change and manipulate the contents of media data has become a common case. For that, we need to use a watermarking technique to protect the copyright of the media as well as for digital right management but without leaving a visual effect. In this paper, we have presented an efficient image watermarking technique to defend the copyright protection of digital signatures. The major steps includes in the watermarking techniques are watermark embedding and watermark extraction. In the embedding process, we have utilized the discrete wavelet transform to decompose the original input medical image. We use the grayscale digital signature image as a watermark and embed it in the HL and LH sub-bands of the wavelet transformed image. We have embedded the every watermark pixel into the chosen sub-bands. Subsequently, we have restored the embedded watermark back to its original position and the watermarked image is attained by the usage of inverse discrete wavelet transform. In the extraction process, the recovery of the watermark image is achieved with the aid of our proposed extraction technique. The results obtained from the experimentation shows that our proposed watermarking techniques provide better results with higher accuracy. In order to prove better performance of our proposed technique, we have compared our results with four recent literature watermarking algorithms by means of compression standards
The present study was an attempt to investigate the rhetorical operations used in English print advertising headlines and to discover what happened to them while translating into Persian. The sample consisted of 65 advertising headlines in English and their corresponding versions in Persian collected from a wider corpus. In order to analyze the rhetorical features in advertising headlines of the two languages, the category of advertising rhetorical figures presented by Huhmann (cited in McQuarrie & Philips 2008) was used. Then, they were checked against the advertising translation strategies proposed by Smith (2006). Finally based on the integration of Halliday\'s (1994) Systemic Functional Grammar (SFL) and Fairclough\'s (1992, 2003) Critical Discourse Analysis (CDA), the ideology behind choosing each category of literary devices, tropes and schemes, was extracted. The finding of the study expanded the translation models proposed by Smith (2006) in translating English headlines into Persian. The most frequent strategy was transference strategy. Persian used repetition schemes greatly, but substitution tropes are dominant operations used in English.
Abstract: \n Introduction: Nowadays over 153 million women use IUD in worldwide, as contraception. Long-term, high effective, and cost effective are advantages this method. This study was conducted to access side effects and prevalence of them of IUD380A during a 6-month period. \n Methods: This clinical trial with use of continued method conducted on 125 candidates applied for IUD insertion. The side effects were recorded in the following 1,2,3,6 months after use of the method in the questionnaires. \nStatistical analysis was performed using Students` t-test, fisher and chi-squared test where appropriate. Data were analyzed by SPSS software.\n Results: The side-effects were included: bleeding, pain, infection, spontaneous expulsion, unintended pregnancy and contraceptive failure. Bleeding, pain and spontaneous expulsion were more frequently happened during the first month, and infection was more commonly complication during 2end month of implantation. However after 6 months, all side effects were in lowest range. Continuation rate was over than 90% for these users. \n Conclusion: According the findings of the present study, the side effects included bleeding; pain, infection and spontaneous expulsion were decreased over time, in CuT380A users. Considering the safety of this method and the low unintended pregnancy rate among the other contraception methods, the use of this IUD is recommended
WMSN security as a flourishing research field has caught the attention of research community with increasing multimedia applications of sensors. Image encryption is one of the ways to protect still images from unauthorized access. The paper proposes a novel still image encryption algorithm based on compressed image sensing and watermarking. We analyze the fact that image signal in WMSN holds large amount of redundancy information, and then project the captured image to the transform domain using only a few significant coefficients. Moreover, we utilize watermarking approach to achieve authentication mechanism. Results show that the proposed scheme can transmit still image signal in resource-constrained WMSN securely and economically.
In each country, a significant portion of annual budget is allocated to construction projects. If project is successfully delivered, the country will experience development process. Iran construction projects indicates that project owners are willing to make contracts in great projects based on industrial and non- industrial construction methods. Since delivering projects based on this method does not have a long history in Iran and contract parties are not fully familiar with it, occurrence of some claims and disputes between project parties is inevitable. The main objective of the present paper is to present a pattern for claim management and prevention in DB and EPC contracts. In this research, in order to prevent claims in design- build projects, factors that affect claims presence in design- build projects have been specified via a library study that includes articles, books and different reports regarding characteristics of design-build projects. In order to increase validity and reliability of the research provided materials are discussed and studied by interviewing some of the experts and professors. Consequently, some factors have been corrected and some others added to the list.