Preferred Language
Articles
/
jcolang-725
Pragmatics and Speech Act- History, Importance and Stages of Development: הפרגמטיקה ופעולת־הדיבור- התולדות, החשיבות ושלבי ההתפתחות (יישמוים בלשון העברית)
...Show More Authors

      The present study stresses two of the most significant aspects of linguistic approach: Pragmatics” and the “Speech Act Theory”, revealing its importance and the stages and levels of development through Hebrew language’s speech acts analysis including (political speech, the Holy Bible, Hebrew stories).

       Chronologically, Pragmatics has always been the center of linguists’ interests due to its importance in linguistic decryptions, particularly, through “Speech Act Theory” that has been initiated and developed by the most prominent philosophers and linguistics.

        The present study discloses that “Speech Act Theory” is the backbone of Pragmatics. This is due to the fact that its scope doesn’t only include the language message sender, but rather (the sender, the receiver, the environment, the context, and the speaker’s social standards and attitude of the language). Reflecting the social culture as well as the society standards and morals, “Speech Act Theory” can effortlessly facilitate grasping the message of the speaker’s intentions by the message receiver. 

תקציר

המחקר הזה שופך אור על שני מושגים עיקריים בחקר הלשון "הפרגמטיקה" ו"פעולת־הדיבור" ועל תודלותיהם ושלבי התפתחותם דרך ניתוח פעולות הדיבור בלשון העברית בכל רבדיה ושלביה (השיח הפוליטי, התנ''ך, סיפורים עבריים). 

הפרגמטיקה עברה שלבים חשובים במרוצת הזמן. בימינו החוקרים התעניינו בגישה הזאת ובמיוחד בתחום התקשורת הלשוני משום שהיא מסייעת אותם בפענח המסרים בין השוחחים, באמצעות התיאוריה המרכזית בחקר הפרגמטיקה "תיאורית פעולת הדיבור", שהופיעה והתפתחה על ידי קבוצה של פילוסופים ובלשנים מפורסמים בחקר הלשוני.

ממצאי המחקר מגלים כי תיאורית פעולת הדיבור היא הבת הבכורה של הפרגמטיקה, משום שהיא אינה מתעניינת אך ורק בדיבור המוען, אלא היא עברה לממדים אחרים כגון (מקבל הפעולה, הסביבה שמתרחשת בה הפעולה, ההקשר הלשוני והחוץ לשוני, נורמות החברה, מעמד הדובר והשומע... וכן הלאה). באמצעות התיאוריה הזאת אנו יכולים להבנת כוונותיו של הדובר כלפי הנמען, בנוסף לכך היא משקפת את התרבות החברתית של חברה מסוימת ואת נורמות המבנים החברתיים והמוסריים שלה.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 27 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Shear bond strength of stainless steel brackets bonded to porcelain surface treated with 1.23% acidulated phosphate fluoride gel compared to hydro fluoric acid with silane coupling agent (In vitro comparative study)
...Show More Authors

Background: With the increasing demands for adult orthodontics, a growing need arises to bond attachments to porcelain surfaces. Optimal adhesion to porcelain surface should allow orthodontic treatment without bond failure but not jeopardize porcelain integrity after debonding.The present study was carried out to compare the shear bond strength of metal bracket bonded to porcelain surface prepared by two mechanical treatments and by using different etching systems (Hydrofluoric acid 9% and acidulated phosphate fluoride 1.23%). Materials and Methods: The samples were comprised of 60 models (28mm *15mm*28mm) of metal fused to porcelain (feldspathic porcelain). They were divided as the following: group I (control): the porcelain surface left u

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
Topical 40% <i>Loranthus europaeus</i> Ointment as an Alternative Medicine in the Treatment of Acute Cutaneous Leishmaniasis versus Topical 25% Podophyllin Solution
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Data Mining Techniques for Iraqi Biochemical Dataset Analysis
...Show More Authors

This research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
Energy Calculation for Excited Lithium Atom in Position Space
...Show More Authors

The energy expectation values for Li and Li-like ions ( , and ) have been calculated and examined within the ground state and the excited state in position space. The partitioning technique of Hartree-Fock (H-F) has been used for existing wave functions.

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Iraqi Journal Of Science
On Semiannahilator Supplement Submodules
...Show More Authors

Let R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes

Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 27 2026
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Bubble Size Distribution In Gas-Liquid Dispersion Column
...Show More Authors

The present work investigates the effect of; superficial air velocities of: 1, 3, and 6 cm/s for two types of perforated distributor on hydrodynamic characteristic in a gas-liquid dispersion column of; air-water, and airaqueous-n-propanol solution. Bubble distribution, gas holdup, and power consumption are parameters take in consideration. Experimental work was carried out in perspex column of 8.5 cm inside diameter and 1.5 m height. Two types of bubble generator (perforated plate) were fixed at the bottom of the column; plate A (99 holes of 0.5 mm diameter and free area of 0.34%), plate B (20 holes of 1.5 mm diameter and free area of 0.62%). Photographic technique was used to measure the bubble parameters. The experimental results were

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
Some Results on Pure Submodules Relative to Submodule
...Show More Authors

Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be pure relative to submodule T of M (Simply T-pure) if for each ideal A of R, N?AM=AN+T?(N?AM). In this paper, the properties of the following concepts were studied: Pure essential submodules relative to submodule T of M (Simply T-pure essential),Pure closed submodules relative to submodule T of M (Simply T-pure closed) and relative pure complement submodule relative to submodule T of M (Simply T-pure complement) and T-purely extending. We prove that; Let M be a T-purely extending module and let N be a T-pure submodule of M. If M has the T-PIP, then N is T-purely extending.

View Publication Preview PDF
Crossref
Publication Date
Fri Feb 28 2025
Journal Name
Journal Européen Des Systèmes Automatisés
Decision-Making Model for Aircraft Landing Based on Fuzzy Logic Approach
...Show More Authors

An aircraft's landing stage involves inherent hazards and problems associated with many factors, such as weather, runway conditions, pilot experiences, etc. The pilot is responsible for selecting the proper landing procedure based on information provided by the landing console operator (LCO). Given the likelihood of human decisions due to errors and biases, creating an intelligent system becomes important to predict accurate decisions. This paper proposes the fuzzy logic method, which intends to handle the uncertainty and ambiguity inherent in the landing phase, providing intelligent decision support to the pilot while reducing the workload of the LCO. The fuzzy system, built using the Mamdani approach in MATLAB software, considers critical

... Show More
View Publication
Scopus (2)
Scopus Crossref