Preferred Language
Articles
/
jRj7_JgBVTCNdQwCdsL9
A Linguistic Study of Russian and American Accusations over Ukraine دراسة لغوية للاتهامات الروسية والامريكية حول اوكرانيا
...Show More Authors

This study presents a linguistic analysis of how Russian and American mainstream media and official statements deployed speech acts of accusation during the 2022 Russian invasion of Ukraine. Using Speech Act Theory (Austin, 1962; Searle, 1976) as the framework. The study analyzes 50 texts of English-language official statements and media headlines from both sides. In this research utterances are categorized into assertives, expressives, directives, commissives, and declarations, and analyzes their pragmatic force in shaping narratives. The analysis reveals contrasts in tone and rhetorical strategy: U.S. officials and media overwhelmingly use assertive accusations and expressive condemnations to morally indict Russia, while Russian counterparts issue assertive counter-accusations along with defensive justifications. Both sides employ commissives through Americans vowing punitive action and support for Ukraine, while Russians pledging to achieve war aims, and they use directives, from Western calls for Russia to cease aggression to Russian demands that NATO stop expansion. These findings suggest that speech acts of accusation are not just reporting or opinion, rather they perform actions: condemning, justifying, threatening, and gathering support. This research provides novel insight into how language itself becomes a battleground, and concludes that such starkly divergent rhetorical strategies, though serving immediate political aims. Furthermore, it entrench the conflict by obstructing mutual understanding, highlighting the essential role of linguistic analysis in conflict studies.

Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Response surface methodology: A review on its applications and challenges in microbial cultures
...Show More Authors

View Publication
Scopus (236)
Crossref (179)
Scopus Clarivate Crossref
Publication Date
Tue Jun 23 2015
Journal Name
Nature Communications
A metabolic stress-inducible miR-34a-HNF4α pathway regulates lipid and lipoprotein metabolism
...Show More Authors

View Publication
Scopus (230)
Crossref (230)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Fuel
Matrix acidizing in carbonate rocks and the impact on geomechanical properties: A review
...Show More Authors

Acid treatment is a widely used stimulation technique in the petroleum industry. Matrix acidizing is regarded as an effective and efficient acidizing technique for carbonate formations that leads to increase the fracture propagation, repair formation damage, and increase the permeability of carbonate rocks. Generally, the injected acid dissolves into the rock minerals and generates wormholes that modify the rock structure and enhance hydrocarbon production. However, one of the key issues is the associated degradation in the mechanical properties of carbonate rocks caused by the generated wormholes, which may significantly reduce the elastic properties and hardness of rocks. There have been several experimental and simulation studies regardi

... Show More
View Publication
Scopus (35)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Toward Improving BIM Acceptance in FM: A Conceptual Model Integrating TTF and TAM
...Show More Authors

Substantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Mar 31 2021
Journal Name
Integrative Systematics: Stuttgart Contributions To Natural History
A confirmed record of the European catfish Silurus glanis L., 1758 (Actinopterygii: Siluriformes: Siluridae) from the southern marshes of Iraq, with a new anatomical set of characters to separate S. glanis and S. triostegus
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Theoretical Study of the Effect of Permeability Tensor upon Drainage of Soils
...Show More Authors

the influence of permeability tensor upon drainage of anisotropic soils under ponded water and steady recharge (rainfall) is theoretically investigated. Tensorial permeability has led to the formulation of mixed type partial differential equations. Since there is no analytical solution to this problem, the formulation is therefore solved numerically by the method of finite elements. The finite element formulation is implemented into a computer model which can be applied to any problem of seepage under steady state
conditions. Two different example problems representing two different flow conditions under full anisotropy have been studied. Results of the model for the isotropic case were checked against exact mathematical solutions de

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
Preparation and Study Hardness and Thermal Conductivity (Tc) to Polyester Resin Composite with (Titanium Dioxide, Zinc Oxide, Acrylonitril, Wood Flour Coconut
...Show More Authors

This study is attempt to improve thermal isolation through measuring thermal conductivity composite of on polyester resin with fillers of (TiO2, ZnO, Acrylonitril, wood flour Coconut (Wf). The grain size of the fillers is 200 µm. The number of samples is (16) in addition to the virgin sample; these samples are prepared by cast molding method for polyester with filler volume fractions (5%, 10%, 15% and 20%). Shore hardness tests were used to measure the hardness and Lee disk method for thermal conductivity. The experimental results showed that the (20% ZnO) sample has the maximum value of thermal conductivity where (20% w.f) has minimum thermal conductivity .on the other hand (15% ZnO) sample give the maximum value of hardness where (20% w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 20 2025
Journal Name
Al–bahith Al–a'alami
Challenges Faced by the Media under the Fragile State: Analytical Study of the Iraqi Media Reality
...Show More Authors

This study aims at defining the concept of the fragile state, a term that came into existence in 2014, when the states that had internal Problems and external interventions were referred to as the failure states. However, the indicators for their designation and the criteria adopted are 12 indicators that address all aspects of the State’s duties vis-a-vis its citizens. The study examined the reasons that led to the continuation of Iraq within the fragile states, and the selection of the five years within the time limits of the study due to the factors that led to the decline of Iraq and falling back within the most fragile countries. The study dealt with the fragile state challenges to the media reality as a result of the change of it

... Show More
View Publication Preview PDF
Crossref