The present study aims at scrutinizing the impoliteness types, causes, and purposes utilized by Iraqi English language learners when refusing marriage proposals. Thus, it attempts to answer the questions: (1) what are the impoliteness formulas used by the Iraqi learners of English in refusing marriage proposals?, and (2) What are their impoliteness triggers/causes and the purposes? The study is significant in bridging the gap that few linguistic types of research concentrate on studying intentionality and emotions allied with impoliteness. Data were collected from 35 Iraqi learners of English responding to 6 situations of marriage. The data were analyzed using Culpeper’s (2011) formulas of impoliteness and Bousfield’s (2007) impoliteness triggers and intentions. The findings revealed that the most regular impoliteness formulas were insults and pointed criticisms/complaints. Regarding impoliteness triggers, the Iraqi learners’ responses reflected anger and disapproval as the most common triggers of impoliteness. Lastly, impoliteness was utilized as an instrument of insulting, quipping, and showing grudge when refusing the marriage situations; however, some impoliteness occurred as a counseling technique. The study concludes with some recommendations for future works.
In recent days, the escalating need to seamlessly transfer data traffic without discontinuities across the Internet network has exerted immense pressure on the capacity of these networks. Consequently, this surge in demand has resulted in the disruption of traffic flow continuity. Despite the emergence of intelligent networking technologies such as software-defined networking, network cloudification, and network function virtualization, they still need to improve their performance. Our proposal provides a novel solution to tackle traffic flow continuity by controlling the selected packet header bits (Differentiated Services Code Point (DSCP)) that govern the traffic flow priority. By setting the DSCP bits, we can determine the appropriate p
... Show MoreSeeds of five cultivars of oats (Avena sativa) were introduced from Italy in 2009. Seeds were propagated on the farm of the Dept. of Field Crops Sci. / Coll. of Agric. / Univ. of Baghdad in the season 2009 – 2010. The cultivars Anatolia, Alguda, Hamel, Pimula and Genzania were planted under 3 irrigation intervals; 3, 4 and 5 weeks to give water depth of 480, 400 and 320 mm, respectively . The depth of water was 80 mm each irrigation. A factorial experiment with RCBD of 4 replicates was conducted in 2 consecutive seasons in 2010 – 2011 and 2011 – 2012. The cultivar Alguda gave highest grain yield (8.07 t/ ha) under 480 mm, and 7.02 t / ha average of 3 water depths. This cultivar was characterized by high growth rate (13.2 g/m2/ d) that
... Show MoreThis literary review addresses the status of the most famous Israeli writer, Amos Oz, through the analysis of relevant articles that highlight various aspects of his literary and political orientations, reflecting his ideological and social background. Oz's literature encompasses a mix of political orientations that many critics view as extreme, while others see them as moderate stances indicative of the author's awareness. And these are what strengthened his literary status in modern Hebrew literature.These trends emphasized the contribution of Oz's works to shaping Israeli cultural consciousness and reflect the challenges facing identity in multiple contexts. He was an advocate for equality between Palestinians and Israelis and
... Show MoreMany new heterocyclic compounds including 4-thiazolidinones containing indole with triazole units were described. The new Schiff bases [VII]a, b and [VIII]a,b synthesized by condensation acid hydrazides [II],[VI] with different (aromatic) aldehydes in absolute ethanol. The refluxing equimolar amounts of the Schiff bases ([VII]a,b, [VIII]a,b) with thioglycolic acid in benzene led to get thiazolidin-4-ones derivatives ([IX]a,b and [X]a-d). Finally, the new derivatives [XI]a-c run out via the reacted compound [IX]a with di
Abstract: The aim of this study was to identify the Distress Tolerance among the Employees in Media and Communication in Baghdad.and to identify the significance of the differences between sex ,scientific specialization ,age,and marital status. and the researcher used the Distrees Tolerance measure for Simon &Gahar 2005. The sample of the study consisted of(37)Employees.The Scale of Distrees Tolerance were used as the study tools after being checked for their Validity and Reliability. The research results indicated that employees have high scores on the scale of stress tolerance and that there are statistically significant differences between the age groups and between married and unmarried people a
... Show MoreStable isotope (?18O, ?D) values were determined along with the chemical compositions at 10 different locations along the Tigris river between Baghdad-Ammara cities of Iraq. The physico-chemical parameters and isotopic data were measured. The sampling site represents 34 % of total Tigris river in the republic of Iraq. The systematically increased in values of stable isotope as move from the downstream of the river and the most significantly appears at Kut lake. This increase occurs as a result of several factors, viz. (a) evaporation occurs low water level in the river and its tributaries, and (b) return flow water to the river from irrigation water in groundwater systems. The change in ion distribution and in the isotopic values related di
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show More