This study shows impoliteness as a form of face-threatening that can be intentionally caused by verbal threats in a particular setting. It investigates: what strategies and mitigators do Iraqi-Kurdish English as a foreign language (EFL) learners use in situations of threat responses? The present investigation paper aims to examine impoliteness strategies and mitigators by these learners when they respond to threatening situations in their context. Thus, it fills a gap in pragmatics literature by investigating the reactions to threats in an Iraqi-Kurdish EFL context. To this end, 50 participants have participated in this study. An open-ended questionnaire in the form of a Discourse Completion Task (DCT) is used to elicit responses from the participants. Besides, a focus group interview is conducted to support the data analysis. The data are coded based on Limberg’s (2009) model of impoliteness and threat responses to figure out the strategies used by the learners. Blum-Kulka, House, and Kasper’s (1989) taxonomy of mitigators is adapted to analyze the mitigators. Overall, the findings reveal that the preferred responses surpass those which indicate dispreference by the learners. They tend to use face-saving acts when they comply with the threatener’s demand and opt for face-threatening acts when they reject that demand indirectly. Moreover, these learners use mitigators to attenuate the illocutionary force of their responses. Finally, this study provides some recommendations and pedagogical implications.
The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreFR Almoswai, BN Rashid, PEOPLE: International Journal of Social Sciences, 2017 - Cited by 22
الثقافة هي النظرية حول العالم والناسواساليب توزيع خبراته عليهم . انها الكل المعقد والتي تشمل المعرفةوالمعتقدات والفن والاخلاق والقوانين والعادات واية امكانيات وعادات يكتسبها الانسان كونه احد اعضاء المجتمع . ان ادراك ثقافة اللغة الاجنبية ينبغي ان يُنظرلها كمكونمهم في عملية تعليم / تعلم اللغة الانكليزية بوصفها لغةاجنبية وتتضمن الثقافة فهم داخلي وتدريجي للمساواة بين الثقافات ، ومنهن متزايد لثقافة الفرد
... Show MoreThe purpose of this study is to identify the extent of the EFL teachers’ implementationoftotal quality management (TQM)principles through teaching English as a foreign language in Iraqi secondary schools.A total of 180 EFL teachers fromsecondary schools in Baghdad during the academic year 2010/ 2011 participated in the study. Data was collected using a scale to identify the extent of implementation of total quality management principles by 140 EFL teachers in their classroom. To support the data collected from the scale,40 teachers were observed by EFL educational supervisors during their lessons. The collected data was analyzed using frequency, means and standard deviation to identify the extent of implementation of (TQM) principles.
... Show MoreRealizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized
... Show MoreThe importance of evaluation depends on many institutions, whether governmental or private, including media institutions, rely on the list to evaluate the weight of things and appreciation, as well as judging things, achievements, and everything related to the institution is concerned. Because through evaluation, institutions can recognize weaknesses and strengths. It is also an effective tool for management review, through which the institution can review everything related to planning and decision-making, leadership, incentives and other administrative matters.
Therefore, this study attempts to shed light on the evaluation process, its basics and its importance in general and in the Kurdish media institutions as a model in part
... Show MoreAfter receipt of military commanders power in 1980, they were determined to solve the
Kurdish question by force, just like their predecessors in resolving such issues, and the
situation became worse when the Kurdish resistance in a more organized than previous years
and behind the Party (PKK) .
After the mass support of the Kurdish widespread party get involved most of the Kurdish
youth in the party organization of the (PKK), prompting Turkish President then to make
decisions and take immediate action firm against the party, but the Kurdish issue began
Tthlhal when he arrived at the helm of President Turgut Ozal in 1989, he worked on the
development of the areas inhabited by the Kurds, specifically the Southeast A
The work in this research presents an experimental and a theoretical study to obtain the effect of using a low permeability geosynthetic material on the longitudinal and lateral coefficients of dispersion. This would have its effect on the contaminants migration through an isotropic, homogenous and saturated soil. The first stage of this research involves the study of the geosynthetic material and in calculating the longitudinal and lateral coefficients of dispersion for an Iraqi sandy soil by using an experimental set-up to simulate the processes. To investigate the effect of using a geosynethtic material on the dispersion coefficients, the test was conducted for each velocity that was used in the experimental work and as follows: with
... Show More