Language always conveys ideologies that represent an essential aspect of the world we live in. The beliefs and opinions of an individual or community can be organized, interacted with, and negotiated via the use of language. Recent researches have paid attention to bullying as a social issue. They have focused on the psychological aspect of bullying rather than the linguistic one. To bridge this gap, the current study is intended to investigate the ideology of bullying from a critical stylistic perspective. The researchers adopt Jeffries' (2010) critical stylistics model to analyze the data which is five extracts taken from Hunt’s Fish in a Tree (2015). The analysis demonstrates that the critical stylistic tools contribute significantly to the linguistic formulation of the concept of bullying and account for a significant amount of the meaning of the text under consideration. The study concludes that the ideology of bullying is represented through using most of the stylistic tools but with different bullying acts.
The marketing of banking service is considered to be one of the impotent fields which showed a universal inebriates . He research showed the comparison between the application of marketing in ideas and application for loot government and private Iraqi bank. The research comets of four parts; Mythology / the concept and the importance of Banking Marketing / Research applichlion/ Conelnion and recommendation.
Abstract
This research studies Abu Baker Al-Siddiq’s commandments to the leaders of his armies. The research is organized into an Introduction, three sections, and a Conclusion.
The Introduction presents a definition of Style and Commandment terminologies. It also presents a brief biography of Abu Baker Al-Siddiq may Allah be pleased with him.
The first section explains the characteristics of the Composition and its rhetorical significance. In this Section, I study the types of predicate and the methods of construction in Abu Baker’s commandments and the rhetoric in using the connection and disconnection modifiers in his expressions.
The second section e
... Show MoreGenerally, radiologists analyse the Magnetic Resonance Imaging (MRI) by visual inspection to detect and identify the presence of tumour or abnormal tissue in brain MR images. The huge number of such MR images makes this visual interpretation process, not only laborious and expensive but often erroneous. Furthermore, the human eye and brain sensitivity to elucidate such images gets reduced with the increase of number of cases, especially when only some slices contain information of the affected area. Therefore, an automated system for the analysis and classification of MR images is mandatory. In this paper, we propose a new method for abnormality detection from T1-Weighted MRI of human head scans using three planes, including axial plane, co
... Show MoreMotifs template is the input for many bioinformatics systems such codons finding, transcription, transaction, sequential pattern miner, and bioinformatics databases analysis. The size of motifs arranged from one base up to several Mega bases, therefore, the typing errors increase according to the size of motifs. In addition, when the structures motifs are submitted to bioinformatics systems, the specifications of motifs components are required, i.e. the simple motifs, gaps, and the lower bound and upper bound of each gap. The motifs can be of DNA, RNA, or Protein. In this research, a motif parser and visualization module is designed depending on a proposed a context free grammar, CFG, and colors human recognition system. GFC describes the m
... Show MoreModerately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or
... Show MoreThe article considers semantic and stylistic motivations for using obsolete lexicon (historicisms) in the text of a work of art. The specifics of the functioning of this process are presented against the background of the features of the contemporary Russian literary language. Attention is focused on the fact that the layer of obsolete lexical units belongs to a number of nationally specific vocabulary, the development of which forms an understanding of the nature of the actualized language. In addition, it should be noted that the semantics of historicisms is culturally commensurate: the latter is explained by the fact that the deactuation of linguistic units is positioned as parallel to the sociocultural and political changes.
... Show MoreThe research aims to build a training program to develop the willpower in the kindergarten children. In order to achieve the objective of the research, the two researchers have developed a Training Program according to the following steps:
- Determining the general objective of the Training Program.
- Determining the behavioral objectives of the Training Program.
- Determining the content of the Training Program.
- Implementing the content of the Training Program sessions.
- Evaluating the Training Program.
The training program consisted of (15) sessions, each session included a set of parts (title, general objective, methods, time and place to implement the sessions, behavioral goals, tool
... Show MoreIntersectionality is a concept that focuses on social inequality towards black people and provides an analytical instruments for creating social justice issues in such a way in order to depict how social marginalization, or privilege occurs differently in various social positions. It does this by focusing on the interaction of multiple systems of oppression. Intersectionality is used to examines how the social factors; race, gender, and class can affect the people’s life especially the immigrants, black people, and refuges. This article will depicts how blacks in Canada are segregated and distinguished from white race. David Chariandy’s I’ve Been Meaning To Tell You: A Letter to My Daughter 2018 is analyzed through Kimberle Crenshaw
... Show MoreA mathematical eco-epidemiological model consisting of harvested prey–predator system involving fear and disease in the prey population is formulated and studied. The prey population is supposed to be separated into two groups: susceptible and infected. The susceptible prey grows logistically, whereas the infected prey cannot reproduce and instead competes for the environment’s carrying capacity. Furthermore, the disease is transferred through contact from infected to susceptible individuals, and there is no inherited transmission. The existence, positivity, and boundedness of the model’s solution are discussed. The local stability analysis is carried out. The persistence requirements are established. The global behavior of th
... Show MoreWorld War II has brought suffering for all people; it has led people to have a nostalgic feeling. The war has many faces all of them are ugly, like death, separation, loneliness, violence, crime, betrayal, and disconnection and many other meanings. Michael Ondaatje in his novel The English Patient (1992) portrays a picture of the effect of World War II on four different characters; Hana a Canadian nurse, The English patient who is Hungarian, Caravaggio a Canadian-Italitan thief, and Kip an Indian sapper. They live together in one house, share their secrets and memories about World War II. Ondaatje brings them together to reveal their secrets and to heal their wounds of the war experience.