Preferred Language
Articles
/
jcolang-725
Pragmatics and Speech Act- History, Importance and Stages of Development: הפרגמטיקה ופעולת־הדיבור- התולדות, החשיבות ושלבי ההתפתחות (יישמוים בלשון העברית)
...Show More Authors

      The present study stresses two of the most significant aspects of linguistic approach: Pragmatics” and the “Speech Act Theory”, revealing its importance and the stages and levels of development through Hebrew language’s speech acts analysis including (political speech, the Holy Bible, Hebrew stories).

       Chronologically, Pragmatics has always been the center of linguists’ interests due to its importance in linguistic decryptions, particularly, through “Speech Act Theory” that has been initiated and developed by the most prominent philosophers and linguistics.

        The present study discloses that “Speech Act Theory” is the backbone of Pragmatics. This is due to the fact that its scope doesn’t only include the language message sender, but rather (the sender, the receiver, the environment, the context, and the speaker’s social standards and attitude of the language). Reflecting the social culture as well as the society standards and morals, “Speech Act Theory” can effortlessly facilitate grasping the message of the speaker’s intentions by the message receiver. 

תקציר

המחקר הזה שופך אור על שני מושגים עיקריים בחקר הלשון "הפרגמטיקה" ו"פעולת־הדיבור" ועל תודלותיהם ושלבי התפתחותם דרך ניתוח פעולות הדיבור בלשון העברית בכל רבדיה ושלביה (השיח הפוליטי, התנ''ך, סיפורים עבריים). 

הפרגמטיקה עברה שלבים חשובים במרוצת הזמן. בימינו החוקרים התעניינו בגישה הזאת ובמיוחד בתחום התקשורת הלשוני משום שהיא מסייעת אותם בפענח המסרים בין השוחחים, באמצעות התיאוריה המרכזית בחקר הפרגמטיקה "תיאורית פעולת הדיבור", שהופיעה והתפתחה על ידי קבוצה של פילוסופים ובלשנים מפורסמים בחקר הלשוני.

ממצאי המחקר מגלים כי תיאורית פעולת הדיבור היא הבת הבכורה של הפרגמטיקה, משום שהיא אינה מתעניינת אך ורק בדיבור המוען, אלא היא עברה לממדים אחרים כגון (מקבל הפעולה, הסביבה שמתרחשת בה הפעולה, ההקשר הלשוני והחוץ לשוני, נורמות החברה, מעמד הדובר והשומע... וכן הלאה). באמצעות התיאוריה הזאת אנו יכולים להבנת כוונותיו של הדובר כלפי הנמען, בנוסף לכך היא משקפת את התרבות החברתית של חברה מסוימת ואת נורמות המבנים החברתיים והמוסריים שלה.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 31 2024
Journal Name
Mathematical Modelling Of Engineering Problems
Investigating the Effects of Canard Dihedral Angle on the Wing Span Loading in a Forward-Swept Wing Aircraft at Transonic Speeds at Steady State Conditions Using Computational Fluid Dynamics
...Show More Authors

Forward-swept wings were researched and introduced to improve maneuverability, control, and fuel efficiency while reducing drag and they are often used alongside canards, to further enhance their characteristics. In this research, the effects of canard dihedral angles on the wing loading of a forward-swept wing in transonic flow conditions were studied, as the wing loading provides a measure of wing’s efficiency (lift/drag). A generic aircraft model from literatures was selected, simulated, and compared to, using CFD software ANSYS/Fluent where the flow equations were solved to calculate the aerodynamic characteristics. The research was carried at two different Mach numbers, 0.6 and 0.9, for five different canard dihedral angles which tra

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Diagnosing the reality of applying the operating requirement according to the international specification for the business continuity management system (ISO 22301:2019) : applied research in the General Tax Authority
...Show More Authors

Abstract

                 The research aims to diagnose the reality of applying the eighth requirement (operation) of the business continuity management system according to the international standard (ISO 22301: 2019), in the General Tax Authority, which is related to planning, implementing and controlling specific processes and procedures to address risks and opportunities, and the research adopted the checklist of the standard ( ISO 22301: 2019), in obtaining information, to measure the extent of application and documentation, the percentages and the weighted arithmetic mean were relied upon, and the research reached a set of result

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 20 2006
Journal Name
00
INVESTIGATING SOME OF THE SYNTACTIC ERRORS MADE BY EFL COLLEGE STUDENTS IN WRITTEN ENGLISH EXPRESSIONS استقصاء بعض الاخطاء النحوية لطلبة الكلية دارسي اللغة الانكليزية لغة اجنبية في التعابير الانشائية
...Show More Authors

View Publication Preview PDF
Publication Date
Wed Aug 27 2025
Journal Name
Baghdad Science Journal
A Clustering Technique Based on the Hard K-Means (H.KM.) Method to Determine the Governorate That Have More Influence for Spreading COVID-19 in the Kingdom of Saudi Arabia
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Baghdad Science Journal
Notes on Approximately Pure Submodules
...Show More Authors

Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be approximately pure submodule of an R-module, if for each ideal I of R. The main purpose of this paper is to study the properties of the following concepts: approximately pure essentialsubmodules, approximately pure closedsubmodules and relative approximately pure complement submodules. We prove that: when an R-module M is an approximately purely extending modules and N be Ap-puresubmodulein M, if M has the Ap-pure intersection property then N is Ap purely extending.

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
An Investigation into Heat Transfer Enhancement by Using Oscillating Fins
...Show More Authors

The present work describes numerical and experimental investigation of the heat transfer characteristics in a plate-fin, having built-in piezoelectric actuator mounted on the base plate (substrate). The geometrical configuration considered in the present work is representative of a single element of the plate-fin and triple fins. Air is taken as the working fluid. A performance data for a single rectangular fin and triple fins are provided for different frequency levels (5, 30 and
50HZ) , different input power (5,10,20,30,40 and 50W) and different inlet velocity (0.5, 1, 2, 3, 4, 5 and 6m/s) for the single rectangular fin and triple fins with and without oscillation. The investigation was also performed with different geometrical fin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Data Classification using Quantum Neural Network
...Show More Authors

In this paper, integrated quantum neural network (QNN), which is a class of feedforward

neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 26 2017
Journal Name
Al-khwarizmi Engineering Journal
Fuzzy Wavenet (FWN) classifier for medical images
...Show More Authors

 

    The combination of wavelet theory and neural networks has lead to the development of wavelet networks. Wavelet networks are feed-forward neural networks using wavelets as activation function. Wavelets networks have been used in classification and identification problems with some success.

  In this work we proposed a fuzzy wavenet network (FWN), which learns by common back-propagation algorithm to classify medical images. The library of medical image has been analyzed, first. Second, Two experimental tables’ rules provide an excellent opportunity to test the ability of fuzzy wavenet network due to the high level of information variability often experienced with this type of images.

&n

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
F-Compact operator on probabilistic Hilbert space
...Show More Authors

This paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.

View Publication Preview PDF
Crossref