Language as a means of communication has long been the concern of many conversation analysts in their studies such as: Sacks et al. (1974), Schegloff et al. (1977), Duncan (1972), Grice (1975) and Burton (1980). Burton has attempted analyzing the first ten transitions of the play “The Dumb Waiter” for mere a presentation of her approach. This paper aims at analyzing the conversational structure of forum on the subject of literary fiction and genre fiction by applying Burton’s model (1980) of analysis to answer the question to what extent this model is applicable in analyzing the presented text. The findings of the investigation have proved the applicability of the structure of conversation formulated by Burton (1980) in her model without modification.
- S. Eliot is one of the important founders of the modernist movement in literature, a cutting-edge poet of the first order. After his 1927 conversion to Anglicanism, he began calling himself a conservative, royal, and a classicist.
"Ash Wednesday" is the first long poem written by him after his conversion. It deals with the struggle that ensues when one who has lacked faith acquires it. It is richly but ambiguously allusive, and deals with the aspiration to move from spiritual barrenness to hope for human salvation.
"Ash Wednesday" not only struggles with an approach to faith but with an approach to a language capable of expressing it. Eliot's style is different from that that predates his conve
هدف البحث إلى بناء مقياسين تخصصين للنزاعات اللاشعورية وحرية الإرادة لمدربي بعض ألعاب القوى والتعرف على مستوى كل منهما لديهم، وإعداد برنامج إرشادي نفسي مستند لرفع مستوى الحالات اللاشعورية وحرية الإرادة للمدربين الذين يعانون من انخفاض مستوى النزاعات اللاشعورية وحرية الإرادة، والتعرف على تأثير البرنامج الإرشادي نفسي في النزاعات اللاشعورية وحرية الإرادة لدى مدربي بعض ألعاب القوى، لتفترض بذلك الباحثة بإ
... Show MoreHead nurses are vital in understanding and encouraging knowledge sharing among their followers. However, few empirical studies have highlighted their contribution to knowledge-sharing behaviour in Online Health Communities (OHCs). In addition, scant literature has examined the moderating role of knowledge self-efficacy in this regard.
This study examines the moderating role of self-efficacy between the association of four selected individual factors of head nurses (i.e., Trust, Reciprocity, Reputation, and Ability to Share) and their knowledge-sharing behaviour in OHCs in Jordan.
<Five subsurface sections covering the entire length of the Jeribe Limestone Formation (Early Middle Miocene) were studied from four oilfields in northern Iraq. It is hoped to unravel this formation microfacies ; depositional environment; diagenetic attributes and their parental processes; and the relationship between these processes and the observed porosity patterns. The microfacies were found to include mudstone, wackestone, packstone, and grainstone, which have been deposited respectively in open platform, restricted platform, and edge platform which represent the lagoonal environment, while the deposits of the lower parts of the Jeribe formation especially in well Hamrin- 2 reflect a deeper fore slope environment. By using the lithofac
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
Estimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre
... Show More