The present study aims at scrutinizing the impoliteness types, causes, and purposes utilized by Iraqi English language learners when refusing marriage proposals. Thus, it attempts to answer the questions: (1) what are the impoliteness formulas used by the Iraqi learners of English in refusing marriage proposals?, and (2) What are their impoliteness triggers/causes and the purposes? The study is significant in bridging the gap that few linguistic types of research concentrate on studying intentionality and emotions allied with impoliteness. Data were collected from 35 Iraqi learners of English responding to 6 situations of marriage. The data were analyzed using Culpeper’s (2011) formulas of impoliteness and Bousfield’s (2007) impoliteness triggers and intentions. The findings revealed that the most regular impoliteness formulas were insults and pointed criticisms/complaints. Regarding impoliteness triggers, the Iraqi learners’ responses reflected anger and disapproval as the most common triggers of impoliteness. Lastly, impoliteness was utilized as an instrument of insulting, quipping, and showing grudge when refusing the marriage situations; however, some impoliteness occurred as a counseling technique. The study concludes with some recommendations for future works.
We can summarize the main risk factors for type 2 diabetes mellitus (T2DM) by looking at our nutrition, age, and lifestyle. β-cell dysfunction and insulin resistance (IR) are outcomes of the pathophysiology of type 2 diabetes. As an indirect result of IR on important metabolic enzymes, lipid and lipoprotein abnormalities are also a factor in T2DM patients. Recent research has indicated that lipid fluctuation may be the cause of poor glucose metabolism as well as one of its effects. Fatty acids (FAs) affect cell membrane fluidity and permeability, insulin receptor binding and signaling, and the translocation of glucose transporters. Therefore, it is suggested that FAs might play a crucial part in the emergence of IR and T2DM. The cu
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThis paper aims at investigating the effect of postmodernism and technology on the social life in Don Delillo's novel The White Noise. In this novel, Don Delillo portrays the chaotic life by using modern technology which has been presented by three ways. The first way is by television as being a source of information and entertainment. The second way is by the toxic event whereas the third is by Dylar's episode and its destructive consequences. He depicts that through the atmosphere of Jack's family plus its effects on the life and thoughts of the elders and society. He proves that technology is leading humanity not to safety, but to death. He further highlights that by showing the impact of technology on the life of the main charac
... Show MoreThe essence of the new work in the satellite TV channels is to provide news coverage of news that will inform the people of what is going on around them in order to increase their political, social, economic and cultural awareness and this drives them to take positions or certain behaviors on according to what the communicator in these channels wants. News and news reports are generally used as a psychological variable to influence public opinion and does not offer interestingness and information. Therefore, satellite TV channels have assumed special attention towards their correspondents desiring to achieve scoop in news coverage and to have the final word in reading events and install it
... Show MoreThe Arab Islamic art was best known as pure abstraction or realism distorted from what is natural. The two styles, or one of them, was the most prominent in the Islamic arts, such as decoration, photography and architecture. The analogy that was prevalent in the non-Islamic world did not have a presence equivalent the aforementioned styles despite the great openness to the cultures of different countries, which characterized that stage, which resulted from the Islamic conquests, the conversion of many people to the Islamic faith, and their migration to the Islamic cities at the time, bringing with them their arts and methods of formulation. This makes us question the influential references that invite the Arab Muslim artist to follow the
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show More