Deception is defined as a linguistic and non-linguistic behavior that is used in interaction in order to make the addressees believe what is believed to be false or lack evidence. McCornack (1992) classifies deception into four manipulative strategies (i.e., fabrication, distortion, equivocation and concealment), other scholars argue that deception encompasses the strategies of “fabrication (outright lying), equivocation (being vague and ambiguous), or concealment (with holding relevant information) Thus, the present study investigates the deception strategies and motives that are used by Johnny Depp and Amber Heard during their defamation trials. Qualitative and quantitative methods are employed when analyzing the data in question. The first method is achieved via using Buller & Burgoon’s (2004) strategies of deception and Ekman’s (1995) motives of deception, while the second method is achieved via counting frequencies and percentages. It is found that the strategies of fabrication and equivocation are frequently used by Johnny Depp, while the strategies of fabrication and concealment are frequently used by Amber Heard. It is concluded that deception can be achieved via using the strategy of fabrication in order to avoid embarrassment, get rid of an awkward situation and get the admiration of others.
This article introduces the concept of finitely null-additive set function relative to the σ– ring and many properties of this concept have been discussed. Furthermore, to introduce and study the notion of finitely weakly null-additive set function relative to the σ– ring as a generalization of some concepts such as measure, countably additive, finitely additive, countably null-additive, countably weakly null-additive and finitely null-additive. As the first result, it has been proved that every finitely null-additive is a finitely weakly null-additive. Finally, the paper introduces a study of the concept of outer measure as a stronger form of finitely weakly null-additive.
Although the Wiener filtering is the optimal tradeoff of inverse filtering and noise smoothing, in the case when the blurring filter is singular, the Wiener filtering actually amplify the noise. This suggests that a denoising step is needed to remove the amplified noise .Wavelet-based denoising scheme provides a natural technique for this purpose .
In this paper a new image restoration scheme is proposed, the scheme contains two separate steps : Fourier-domain inverse filtering and wavelet-domain image denoising. The first stage is Wiener filtering of the input image , the filtered image is inputted to adaptive threshold wavelet
... Show MoreAbstract
Electrical magnate was designed and constructed, the optimum Magnetic flux and the effect of time on the physical properties of the alkaline (magnetic water) produced from the bottled drinking water [the total dissolved solids (TDS) or the electrical conductivity, and pH] were studied, to simulate ZamZam water in Mekka Saudi Arabia. Also, the efficiency of magnetic field from this designed electrical magnate in decreasing the TDS of sea water (of 1500 ppm NaCl Content), to convert it to water suitable for irrigation (TDS<1000 ppm) was investigated in this work.The results show that the magnetic flux from our designed electrical magnate in the range of (0.013- 0.08) Tesla and 30 minut
... Show MoreIn order to select the optimal tracking of fast time variation of multipath fast time variation Rayleigh fading channel, this paper focuses on the recursive least-squares (RLS) and Extended recursive least-squares (E-RLS) algorithms and reaches the conclusion that E-RLS is more feasible according to the comparison output of the simulation program from tracking performance and mean square error over five fast time variation of Rayleigh fading channels and more than one time (send/receive) reach to 100 times to make sure from efficiency of these algorithms.
يعد شعر المنفى احد اهم روافد الادب المعاصر فهو يعكس الإبداع الشعري الحقيقي للشاعر المنفي، ويعكس في الوقت ذاته الحنين والألم الذي يعاني منه بسبب البعد عن وطنه. ومن ناحية أخرى، يصور شعر المنفى حالة المقاومة والنضال التي يختزنها الشاعر . نتناول في هذا البحث م وضوع شعر المنفى عند شاعرين منفيين لم يلتقيا في بلد واحد ولم يتبنيا ثقافة فكرية مشتركة, إلا أن الشاعرين تحملا نفس مرارة المنفى التي عبرا عنها بشكل واضح في شعر
... Show MoreResumen
Este trabajo de investigación ofrece uno de los temas relevantes en la lengua, el cual es estudiar las dimensiones sintácticas, semánticas y pragmáticas de las preposiciones, en general, y de las dos preposiciones "Para" y "Por" en concreto, en una unidad linguística más amplia que la llamada "Oración". En la parte referida al estudio de las dos preposiciones mencionadas, estudiamos sus distntos usos funcionales, usos que se acercan, unas veces, entre sí y se alejan en otras.
Abstract
... Show Moreمعيار القصديَّة في النص هو من الدراسات الحديثة المتطورة من لسانيات الجملة الى لسانيات النص ، وتحليل الخطاب . والذي يعنى بالطرق والأدوات التي يستغلها المؤلف لتحقيق الغايات المقصديَّة
وهذا البحث ناقش مفهوم(القصديَّة) لغةً ،واصطلاحاً . فاللغة والكلام شكل من أشكال الوجود الإنساني و( الكلام) هو وسيلة التواصل بين الملقي القارئ ، والمتلقي السامع ؛ وللتوصل الى الدلالة القصديَّة الدقيقة للغة المنطوقة وا
... Show MoreAbstract
Magnetic abrasive finishing (MAF) is one of the advanced finishing processes, which produces a high level of surface quality and is primarily controlled by a magnetic field. This paper study the effect of the magnetic abrasive finishing system on the material removal rate (MRR) and surface roughness (Ra) in terms of magnetic abrasive finishing system for eight of input parameters, and three levels according to Taguchi array (L27) and using the regression model to analysis the output (results). These parameters are the (Poles geometry angle, Gap between the two magnetic poles, Grain size powder, Doze of the ferromagnetic abrasive powder, DC current, Workpiece velocity, Magnetic poles velocity, and Finishi
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreCorrosion of steel reinforcement is one of the biggest problems facing all countries in the world like bridges in the beach area and marine constructions which lead to study these problems and apply some economical solutions. According to the high cost of repair for these constructions, were studied the effect of using kind of chemical compounds sodium nitrite(NaNO2) and sodium silicate(Na2SiO3) as corrosion inhibitors admixture for steel bars that immersed partially in electrolyte solution (water + sodium chloride in 3% conc.) (Approximately similar to the concentration of salt in sea water). The two inhibitors above added each one to the electrolyte solution at concentrations (0.5%, 1% and 2%) for both
... Show More