Preferred Language
Articles
/
mheiyI0BVTCNdQwCchtg
Aggressive Language in Literature: A Pragmatic Approach
...Show More Authors

Aggression is a negative form of an anti-social behavior. It is produced because of a particular reason, desire, want, need, or due to the psychological state of the aggressor. It injures others physically or psychologically. Aggressive behaviors in human interactions cause discomfort and disharmony among interlocutors. The paper aims to identify how aggressive language manifests itself in the data under scrutiny in terms of the pragmatic paradigm. Two British literary works are the data; namely, Look Back in Anger by John Osborne (1956), and The Birthday Party by Harold Pinter (1957). This paper endeavors to answer the question of how aggressive language is represented in literature pragmatically? It is hoped to be significant to linguistic and psychological studies in that it clarifies how aggression is displayed in human communications linguistically. Qualitative and quantitative analyses are conducted to verify the findings. It ends with some concluding remarks, the most important of which are: insulting, belittling, ridiculing and threatening are prevalent speech acts; simile, hyperbole, metaphor and repetition appear due to Grice’s maxims breaching while the use of taboo words, calling names, or abusive words are the impoliteness strategies that are distinguished in the data.

Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
New Approach for Solving Three Dimensional Space Partial Differential Equation
...Show More Authors

This paper presents a new transform method to solve partial differential equations, for finding suitable accurate solutions in a wider domain. It can be used to solve the problems without resorting to the frequency domain. The new transform is combined with the homotopy perturbation method in order to solve three dimensional second order partial differential equations with initial condition, and the convergence of the solution to the exact form is proved. The implementation of the suggested method demonstrates the usefulness in finding exact solutions. The practical implications show the effectiveness of approach and it is easily implemented in finding exact solutions.

       Finally, all algori

... Show More
View Publication Preview PDF
Scopus (23)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Engineering
Hydraulic Characteristics and Discharge of Canal Sluice Gate: Practical Approach
...Show More Authors

Simplifying formulas that are used for calculations and design are the aim of researchers. For present work, the approach to distinguish the flow under sluice gate was conducted in a laboratory. The extensive experimental program was done to collect fifty-four data points for both free and submerged flow conditions. The data included different discharges, gate openings, flow depths at upstream as well as the flow depths represent a tail water and at a contracted section for downstream. The collected data are analyzed according to a problematic that may encounter in the field, to present a more straightforward (but with acceptable accurate) practical features equations and charts. Based on the proposed formulas, five meth

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 06 2026
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Enhancing Stud Arc Welding Technique Vai Utilizing FuzzyLogic Approach (FLA)
...Show More Authors

A fuzzy logic approach (FLA) application in the process of stud arc welding environment was implemented under the condition of fuzziness input data. This paper is composed of the background of FLA, related research work review and points for developing in stud welding manufacturing. Then, it investigates thecase of developingstud arc welding process on the controversial certaintyof available equipment and human skills.Five parameters (welding time, sheet thickness, type of coating, welding current and stud shape) were studied.A pair of parameter was selected asiteration whichis welding current and welding time and used fo

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (28)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Sep 15 2022
Journal Name
Al-adab Journal
Vocabulary of the modern Russian language from the point of view of stylistic diversity
...Show More Authors

Сатья посвящена выделению и описанию функциональных стилей русского языка. В работе будет предствлена стилистическая характеристика заимствованной лексики, которая в некоторых случаях заменяет собственно русские слова, что может приводить к затемнению смысла высказывания, эвфемизации его, кроме того, заимствования заполняют определенные стилистические книши, образовавшиеся в связи со структурны

... Show More
View Publication
Crossref
Publication Date
Wed Aug 26 2020
Journal Name
International Journal Of Research In Social Sciences And Humanities
THE CORRELATION BETWEEN IRAQI EFL UNIVERSITY STUDENTS WORKING MEMORY CAPACITY AND THEIR LANGUAGE PROFICIENCY
...Show More Authors

View Publication
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Political Sciences Journal
Exploring the Effects of European Union Conditionality Language on European Mediterranean Human Rights Dialogue
...Show More Authors

Since more than a decade, human rights dialogue in the European Mediterranean Region has been marked by a number of tensions. Although a number of factors contribute to such disputes, the effect of human rights conditionality, which ties EU economic cooperation progression with partner countries human rights advancement, on the dialogue has not been studied. Understanding the aspects, impacts, and effects of conditionality on Euro-Med relations is crucial for furthering dialogue. Yet this variable has been almost entirely neglected in academic and policy research. The research concludes several direct and indirect impacts of conditionality on human rights dialogue using a mixed methodology approach. Direct effects are reflected in the wi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of The College Of Languages (jcl)
PERSPECTIVE METHODS AND DIRECTIONS IN STUDYING THE LANGUAGE OF RUSSIAN FOLKLORE: ПЕРСПЕКТИВНЫЕ МЕТОДИКИ И НАПРАВЛЕНИЯ В ИЗУЧЕНИИ ЯЗЫКА РУССКОГО ФОЛЬКЛОРА
...Show More Authors

The paper deals with the language of Russian folklore. Folklore is a unique sphere of existence of the language, the most vivid expression of the national mentality. The folklore word embodied the perception and evaluation of the surrounding world. “What did the word in general mean for the life of the people? The word was equated ... with life itself. The word generated and explained life, it was ... the keeper of memory and the guarantee of the infinity of the future. The folklore text is studied by literary critics, ethnographers, historians, culturologists, and art historians. In the twentieth century, a new science emerged - linguo-folkloristics, the goals and objectives of which were formulated by A.T. Khrolenko only in the seven

... Show More
View Publication Preview PDF
Crossref