The present study attempts to examine verbal/nonverbal impoliteness in the classroom interaction and outside it in one of the movies, namely, The Marva Collins. Impoliteness, which is significantly studied within pragmatics, is a negative attitude towards particular behaviors. It always presumes to have emotional concerns for at least one participant who has caused it. This study is an attempt to examine verbal/nonverbal impoliteness in The Marva Collins movie. The study aims to investigate the different types of impoliteness strategies used in the four selected scenes and find out whether the speaker’s status has anything to do with the types of impoliteness. Besides, the functions performed are also examined by following a qual
... Show MoreThe harsh human suffering experienced by the Andalusians were a religious conflict and racist impact on all aspects of public life. The religious factor most important factors that determined the nature of the hostile relationship between the Andalusian and Castilian, Castile has sought to make them Christians by force through laws that deprived them of all their rights. In spite of the large number of those laws, the authority admitted inability to subdue the Andalusians to its will through the issuance of the final decree of expulsion.
Sharif al-Murtada was a historical figure, He is the author of many works in which scientific material is important for scientific studies and research, Because of the importance of his writings and his age, and the impact he left in the intellectual movement was one of the stars of Islamic civilization .
Embedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Domestic violence, or as sometimes known as family abuse, is usually related to a domestic or local setting as in cohabitation or in marriage. It can take the forms of being physical, verbal, economic or emotional. Globally, most of the domestic violence is overwhelmingly directed to females as they tend to experience and receive severe forms of violence, most likely because they do not involve their intimate, or sometimes even non-intimate partners, in the process of mental and physical self-defense. Sometimes countries justify domestic violence directed to females, they may be legally permitted when the reasons behind it are related to issues of women's infidelity. Usually, the permission to violent acts is related to
... Show MoreIn Nathaniel Hawthorn's The Scarlet Letter, love and hate appear as independent powers that consume their holders. In this novel, Nathaniel Hawthorn presents a picture of the Puritans which shows an important part of American history. The Scarlet Letter outlines the American's brief moment of theocracy and extreme social order. Hawthorn is one of the first American writers to explore the hidden motivations of his characters. The Puritans wanted to establish an ideal community in America that can act as a model of influence for what they saw as a corrupted civil and religious order in England. This sense of mission is the core of their religious and social identity. That is why they required a strict moral regulation. The research tackles th
... Show MorePostcolonial reading for any text aroused a great controversy that deserves to be studied it give more dimensions with the awareness that it can be interpreted in numerous ways. Postcolonialism is a challenging field as it covers variety of political, psychological, cultural, and economical activities often called ‘postcolonial’. The concept of culture worked effectively in shaping and mapping postcolonial struggles, which have so profoundly reshaped our world. Man's sense of cultural displacement is the core of this project. Man's quest for cultural adaptation forms a kind of equilibrium and compromise to the vision of human liberation. It is very important to minimize disadvantages and to internalize the logic of Western colonization.
... Show MoreEvil pervades the narrative scene in Tolkien. Hence; his major themes in The Lord of the Rings are shown to be the Evil Nature of Power, the Tyranny of Technology and War as a Destructive Agent. Evil is not as powerful as good. The Boethian conception of evil comes through evil beings such as Melkor Morgoth in The Silmarillion or Sauron ,who cannot do good things but only pervert or mock things; In The Lord of the Rings; Tolkien seems to suggest that there is no absolute evil. The other conception of evil is the Manichaen, a conception which receives more emphasis in Tolkien's trilogy and which sees the world as a battle-ground for warring forces of good and evil. Tolkien frequently personifies the Ring as if it were acting with a will of i
... Show MoreThe book gives details about the healing power of love
The concept of decolonization of trauma has intrigued researchers for years due to its prolonged effect on personal and cultural levels. The process of intellectual decolonization involves defensive survival mechanisms, such as cultural rituals using traditional practices, nostalgic dialogues that idealize memories and recollections, and conversations about identity to navigate postcolonial trauma displacement. Symbolic connections evoke strong emotional responses, bridging the gap between the characters‘ physical dislocation and their imaginary homeland. Cocooning identity represents a space where a multidimensional self emerges—one that holds the victim of trauma, the survivor who endures, and the narrator, who constructs an idealized
... Show MoreThe study scrutinises intermingled relations between children literature and some ecological issues. Such interwoven relationships would be highly recommended to encourage children to explore and identify themselves with nature from early ages to avoid facing an extreme experience later on. The research limits its scope to two novels Suzanne Collins’ (1962) The Hunger Games trilogy (2003-2007) and William Golding’s (1911-1993) Lord of the Flies (1954), and both novels have no direct connections with Ecology and the Eco-consciousness, yet it offers an insightful description about Man’s experience with Nature. Moreover, it raises serious moral questions, raises awareness, heals wounds and suggests solutions for the problems th
... Show MoreA New Perspective About Masculinity and the Issue of Identity in Ernest Hemingway's The Old Man and The Sea and Michael Ondaatje's in The Skin of a lion
لطالما كان انتظار الملأ للخلاص والتي ترتبط بشكل اساسي بال "منتظر" او ال "مخلص" جزءا من الوعي الجمعي الذي تطور ليكون مرتبطا بالنمط البدائي والذي بدوره أصبح مرآةً تنعكس على اساسها فرص الانسان نحو النجاة. في مسرح القرن العشرين, لم تنفك فكرة الانتظار ان ترتبط بمسرحية صاموئيل بيكيت العبثية " في انتظار غودو" كونها مثالا رمزيا بالرغم من انه تجسيد شخصية "غودو" وقعت تحت وطأة الكثير من عمليات التحوير والتغيير في اطاره
... Show MoreThe concept of Assemblage appeared obviously in Postdramatic works, where a character or a text may stand as an assemblage of potentialities in the sense that it signifies unidentified subjectivity. Assemblages are constituted essentially of heterogeneous elements yet fused without specific demarcations. In order to enjoy the desired productivity at a "smooth pace," the regularities of political and societal institutionalization are disseminated. To achieve this dissemination, Deleuze-Guattari suggest an unsatiated platform of a "Body without Organs' (BwO), where desire escapes identification. Martin Crimp (b. 1956) defines his off-stage characters in Attempts on Her Life (1997), Anne, or whatever the name is, as a 'BwO', upon which
... Show Moreلقد انبثقت رؤيا حديثة في مسرح الثمانينات من القرن العشرين كان هدفها دحر حس الاسر الذي عاشه انسان العصر الحديث وفي محاولة للارتقاء بارادته وحرية الاختيار نحو الانعتاق من محاولات المصادرة الفظة لها. وبالرغم من افتراض هذه الرؤيا انها ذات طابع سلبي, الا ان رؤيا الانتحار قدعدت بانها قادرة على ان تجعل في متناول يد الانسان احساسا طموحا بالتحكم على الاقل بنوع النهاية التي يكتبها لحياته. وقد انعكست هذة الرؤيا ال
... Show MoreCultural and identity scars have been engraved in the body of ethnic minority of Muslims in America due to the bloody attacks of 9/11. These events have created thus traumatic experiences on the party who witnessed the events at close and the people on whom the blame is conclusively directed, Muslim Americans. For Americans, the attacks resulted in a proud reassertion of the national virtue and communal integrity from which Muslim Americans were excluded. This reassertion is accompanied for Muslims by a reconstruction of a cultural identity away from their origin homeland and under pressures and prejudices that made the process of reconstruction to be severely challenging. Accordingly, the challenge needed to be portrayed to overcome the d
... Show MoreThe comparative study tries to find the common points in two different authors’ works and in this kind of studying so many other common but the hidden points may be revealed. Postwar literature is somehow one of the best literary genres for finding the common factors and features that the poets have tried to present in their works elements such as desire to be winner, cruelty, inhumanity, and absurdity of the war. The Iranian poet late Qaisar Aminpour(1961-2007) and Yusef Komunyakaa ( 1947) from Bogalusa, Louisiana, are among the great American and Iranian poets whose works so many times have been interpreted and analyzed. The finding the outstanding and the most important points and themes in the postwar poems of these
... Show MoreConflict is a common but complicated phenomenon. It has been extensively researched in many domains, including philosophy, sociology, psychology, and linguistics. Using the Critical Discourse Approach, this study examines the issue of self-society conflict in The Handmaid’s Tale. The significance of this work lies in the identification and explanation of the discursive strategies that force the ideological polarization of the positively portrayed self versus the negatively portrayed other. The purpose of this study is to answer two questions: what are the discursive strategies used in The Handmaid’s Tale to create a positive or negative representation, and how are these strategies implemented? Five extracts from The Handmaid’s
... Show MoreThe transition of customers from one telecom operator to another has a direct impact on the company's growth and revenue. Traditional classification algorithms fail to predict churn effectively. This research introduces a deep learning model for predicting customers planning to leave to another operator. The model works on a high-dimensional large-scale data set. The performance of the model was measured against other classification algorithms, such as Gaussian NB, Random Forrest, and Decision Tree in predicting churn. The evaluation was performed based on accuracy, precision, recall, F-measure, Area Under Curve (AUC), and Receiver Operating Characteristic (ROC) Curve. The proposed deep learning model performs better than othe
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreThis research aims at identifying the Iraqi EFL students' academic buoyancy in reading and listening skills and then finding out the difference between the two skills; Furthermore, finding out the five predictors differences of each of the two scales. Two academic buoyancy scales used to collect data. After achieving the scales' psychometric characteristics, they are submitted to the study sample. The sample of (100) female students selected according to the stratified random method from the second class at the Department of English\ College of Education for Women\ University of Baghdad. The results show that the students have academic reading buoyancy and have not academic listening buoyancy; the difference between the two abilities shows
... Show MoreThis article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec
... Show MoreSocial protection meets different aspects of the needs of vulnerable groups, such as the economic, health, education, and family relations and ties in the Iraqi society. This is because vulnerable groups have suffered from social and economic influences that have negative implications on the social reality as a whole. Poverty is a case in point, which paved the way to frequent setbacks that have led to social structure instability. Accordingly, the present study aims to examine the role and effect of the Net of Social Protection Program in equally distributing social protection to curb or mitigate any negative consequnces that might happen to the poor segments and vulnerable people, who are succeptible to shocks, such as: the orphans, un
... Show Moreيُعد اضطراب طيف التوحد من الاضطرابات النمائية الأكثر انتشاراً، ويشكل تحدي للأُسرة والمجتمع بأكمله، وتنوعت أساليب تشخيصه حسب الأعراض الظاهرة، وينبغي ان يتم التفريق بين هذا الإضطراب والاضطرابات النمائية الاخرى، كذلك هدف البحث إلى إعداد أداة لقياس هذا الإضطراب وفقا للدليل الإحصائي الخامس للإضطرابات النفسية والعقلية (DSM-5 ، وكذلك تعرف أكثر الأعراض شيوعاً لدى عينة من اطفال اضطراب طيف التوحد بلغت (60)
... Show Moreيستهدف البحث الحالي التعرف إلى 1 .بناء مقياس سمات الشخصية المفضلة لدى معلمي ومعلمات التربية الخاصة في العراق من وجهة نظر ذوي اإلختصاص والعاملين في هذا المجال. 2 .مستوى توافر سمات الشخصية المفضلة لدى معلمي ومعلمات التربية الخاصة في العراق من وجهة نظر ذوي اإلختصاص والعاملين في هذا المجال. 3 .داللة الفروق اإلحصائية في سمات الشخصية المفضلة لدى معلمي ومعلمات التربية الخاصة ً في الع ارق من وجهة نظر ذوي اإلختصاص والعا
... Show Moreاستهدف البحث الحالي قياس الذاكرة العاملة لدى التالميذ ذوي صعوبات تعلم القراءة، وتحقيقا ألهداف البحث اعد الباحثان اختبار الذاكرة العاملة للتالميذ ذوي صعوبات القراءة باستعمال مهام بصرية - سمعية وتنفيذية على وفق إنموذج بادلي)Baddely)، ثم استخرج الخصائص السيكومترية لكل منهما المتمثلة بالصدق والثبات. وتحدد البحث الحالي بالتالميذ ذوي صعوبات تعلم القراءة في المدارس االبتدائية التابعة للمدير ية العامة لتربية بابل ف
... Show More