Preferred Language
Articles
/
8Bcgk44BVTCNdQwCi1Qc
Impoliteness Formulas, Triggers, and Purposes to Refusal as Employed by Iraqi English Learners
...Show More Authors

The present study aims at scrutinizing the impoliteness types, causes, and purposes utilized by Iraqi English language learners when refusing marriage proposals. Thus, it attempts to answer the questions: (1) what are the impoliteness formulas used by the Iraqi learners of English in refusing marriage proposals?, and (2) What are their impoliteness triggers/causes and the purposes? The study is significant in bridging the gap that few linguistic types of research concentrate on studying intentionality and emotions allied with impoliteness. Data were collected from 35 Iraqi learners of English responding to 6 situations of marriage. The data were analyzed using Culpeper’s (2011) formulas of impoliteness and Bousfield’s (2007) impoliteness triggers and intentions. The findings revealed that the most regular impoliteness formulas were insults and pointed criticisms/complaints. Regarding impoliteness triggers, the Iraqi learners’ responses reflected anger and disapproval as the most common triggers of impoliteness. Lastly, impoliteness was utilized as an instrument of insulting, quipping, and showing grudge when refusing the marriage situations; however, some impoliteness occurred as a counseling technique. The study concludes with some recommendations for future works.

Crossref
View Publication
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
Microbiological Examination of some ImportedCanned and Frozen Foods
...Show More Authors

A number of juices, jams, canned foods and frozen fishes available in local markets were inspected with respect to microbial contamination. We have determined the total viable bacterial cell counts in these samples and the number of g(-) lactose fermentors as a bacterial indicator of food spoilage. The results indicated that most of the food items inspected, were contaminated with large numbers of different species of g(-) ,g(+), yeast and fungi and some were contained more than the maximum permissible number of pathogenic g(-) enteric E-coli, which render these food items unsafe for human consumption.

View Publication Preview PDF
Crossref
Publication Date
Thu Aug 01 2013
Journal Name
The Iraqi Journal Of Agricultural Sciences
VIBRATION MEASUREMENT AND PERFORMANCE EFFICIENCY OF GRASS MOWER
...Show More Authors

The experiment was conducted in field of the University of Baghdad, Jadryia region, Baghdad to measure vibration and performance efficiency of grass mower (machine cutting grass). Vibration in three axes are longitudinal X , lateral Y and vertical Z in four places of mower machine during cutting grass and Practical Productivity, Efficiency and Fuel Consumption measured in this experiment . Factorial design (3 x 2) used, mower speeds included 1.9 3.6 and 6.4 km/hr and engine load included idling and full load according to randomized complete design were used in this experiment. Least Significant Design (LSD) 0.05 was used to compare the mean of treatment. Result were showed that the mower speed 6.4 km/hr recorded high productivity (0.6557 ha

... Show More
Preview PDF
Publication Date
Sat Sep 30 2017
Journal Name
College Of Islamic Sciences
Revelation period And suspicions of Orientalists: Critical study
...Show More Authors

With the narratives and sayings in the biography of the Prophet and the science of the Koran, Orientalists used this case as a pretext to distort the biography of the Prophet and his character and patience for his call. Researcher in the folds of his research.

View Publication Preview PDF
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Blindness And Sight In Ralph Ellison's Invisible Man
...Show More Authors

The Civil Rights era has been an era of struggle for the African American in the
Unites states. Thus, many writers devoted their writing to reflect the racism and
discrimination that many have suffered from, among them is Ralph Ellison.
Ralph Ellison is a 20th century African-American writer and scholar best known for
his renowned, award-winning novel Invisible Man. He illustrates the powerful
social and political forces that conspire to keep black Americans in their place,
denying them the right to life, liberty, and the pursuit of happiness guaranteed to all
Americans. Invisible Man is a 1952 novel that addresses many of the social and intellectual
issues facing African-Americans in the twentieth century. It exa

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 18 2004
Journal Name
Iraqi Journal Of Laser
Quantum Cryptography and a Quantum Key Distribution Protocol
...Show More Authors

In this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.

View Publication Preview PDF
Publication Date
Sun Mar 12 2017
Journal Name
Al-academy
The aesthetic and communicative " dimensions in t.v photo"
...Show More Authors

T.V photo in modern shows has emerged with special characteristics and signs that have developed in cope with the development of medium and technique. This leads to adding a variety of aesthetic dimensions which are capable of attracting audience because of its communicative elements that have an important role in increasing of T.V show Watching. As a result, the research is limited to methodological Framework as the problem. The problem of the research deals with emerging the aesthetic dimensions of T.V photo. The major question is (what are the aesthetic and communicative dimension of T.V Photo?). The research aims at finding out the aesthetic dimensions of T.V photo in modern artworks. The significance of the research on the presented

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 12 2013
Journal Name
International Journal Of Computer Applications
Design and Implementation of a Practical FTTH Network
...Show More Authors

Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Iraqi Journal Of Physics
Nanosecond laser pulses for aluminum and copper drilling
...Show More Authors

Nd:YAG laser pulses of 9 nanosecond pulse duration and operating wavelength at 1.06 μm, were utilized to drill high thermal conductivity and high reflectivity aluminum and copper foils. The results showed a dependence of drilled holes characteristics on laser power density and the number of laser pulses used. Drilled depth of 74 ϻm was obtained in aluminum at 11.036×108 W/cm2 of laser power density. Due to its higher melting point, copper required higher laser power density and/or larger number of laser pulses to melt, and a maximum depth of 25 μm was reached at 13.46×108 W/cm2 using single laser pulse.

View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Ibn Al-haitham J. For Pure & Appl. Sci
Comparative Anatomical Study between Typhadomengensis and Phragmites communis
...Show More Authors

Both of the species Typha domengensis and Phragmites communis among the most important plant endemic in flora of Iraq from monocotyledon. Due to the similarity of the two species with each other in many morphological characteristics such as the environment where they live and the form of leaves and type of leaf venation and type of stomata….ets, also both of species belong to monocots plant therefore this research work was conducted find anatomical differences that have the same as taxonomic value to help distinguishing between both species under study. Through this research, we found great importance to the anatomical characteristics which we reached by studying the roots, stems and leaves sections f

... Show More