The present study aims at scrutinizing the impoliteness types, causes, and purposes utilized by Iraqi English language learners when refusing marriage proposals. Thus, it attempts to answer the questions: (1) what are the impoliteness formulas used by the Iraqi learners of English in refusing marriage proposals?, and (2) What are their impoliteness triggers/causes and the purposes? The study is significant in bridging the gap that few linguistic types of research concentrate on studying intentionality and emotions allied with impoliteness. Data were collected from 35 Iraqi learners of English responding to 6 situations of marriage. The data were analyzed using Culpeper’s (2011) formulas of impoliteness and Bousfield’s (2007) impoliteness triggers and intentions. The findings revealed that the most regular impoliteness formulas were insults and pointed criticisms/complaints. Regarding impoliteness triggers, the Iraqi learners’ responses reflected anger and disapproval as the most common triggers of impoliteness. Lastly, impoliteness was utilized as an instrument of insulting, quipping, and showing grudge when refusing the marriage situations; however, some impoliteness occurred as a counseling technique. The study concludes with some recommendations for future works.
This study is conducted in order to, investigate the trophic state of Duhok Lake Dam located within Duhok city, Iraq. Water samples are collected seasonally from three monitored sites during 2011. The parameters used for assessing water quality and trophic status level include: water temperature, pH, EC, TDS, DO, BOD5, nutrients, Secchi disk transparency, and chlorophyll a. The results reveal that DO is above 5 mg.l-1 in all sites, BOD5 value is within permissible level for domestic uses. Water quality considered as a hard type. High sulfate concentration is recorded during the study period. Trophic state shows that water type is classified as mesotrophic during autumn season, while it is regarded as eutrophic in other seasons. TDN/TDP rati
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreA pioneering idea for increasing the thermal performance of heat transfer fluids was to use ultrafine solid particles suspended in the base fluid. Nanofluids, synthesized by mixing solid nanometer sized particles at low concentrations with the base fluid, were used as a new heat transfer fluid and developed a remarkable effect on the thermophysical properties and heat transfer coefficient. For any nanofluid to be usable in heat transfer applications, the main concern is its long-term stability. The aim of this research is to investigate the effect of using four different surfactants (sodium dodecyl benzene sulfonate (SDBS), sodium dodecyl sulfate (SDS), cetyl trimethylammonium bromide (CTAB), and gum Arabic (GA)), each with three different
... Show MoreObjective: The aim of this study was to develop a bioadhesive gel of gatifloxacin for the treatment of periodontal diseases.Methods: Periodontal gels of gatifloxacin were prepared using different hydrophilic polymers such as carbopol 940 (CP 940), carboxymethyl cellulose (CMC) and hydroxypropylmethyl cellulose (HPMC) in varied concentrations, either alone or as a combination. The prepared gels were evaluated for their physical appearance, pH, drug content, viscosity, bioadhesiveness and in vitro drug release profile. The influence of the type and the concentration of polymer on the drug release as well as on viscosity and mucoadhesiveness of prepared gels were investigated.Results: The prepared gels showed acceptable physical proper
... Show MoreFour new binuclear Schiff base metal complexes [(MCl2)2L] {M = Fe 1, Co 2, Cu 3, Sn 4, L = N,N’-1,4-Phenylenebis (methanylylidene) bis (ethane-1,2-diamine)} have been synthesized using direct reaction between proligand (L) and the corresponding metal chloride (FeCl2, CoCl2, CuCl2 and SnCl2). The structures of the complexes have been conclusively determined by a set of spectroscopic techniques (FT-IR, 1H-NMR, and mass spectra). Finally, the biological properties of the complexes have been investigated with a comparative approach against different species of bacteria (E. coli G-, Pseudomonas G-, Bacillus G+,
... Show MoreThe spectrum of clinical efficacy of Methotrexate (MTX) is broad in that MTX is used in the treatment of certain cancers, severe psoriasis and rheumatoid arthritis.Various mechanisms by which cancer cells grown in tissue culture become resistant to anticancer drugs. The use of multiple drugs with different mechanisms of entry into cells and different cellular targets allows for effective chemotherapy and high cure rates. In an efforts to develop effective strategies that increase the therapeutic potential of anticancer drugs with less systemic toxicity ,are being directed towards the investigation of dietary supplements and other phytotherapeutic agents for their synergistic efficacy in combination with anticancer drugs. A promi
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreClassifying an overlapping object is one of the main challenges faced by researchers who work in object detection and recognition. Most of the available algorithms that have been developed are only able to classify or recognize objects which are either individually separated from each other or a single object in a scene(s), but not overlapping kitchen utensil objects. In this project, Faster R-CNN and YOLOv5 algorithms were proposed to detect and classify an overlapping object in a kitchen area. The YOLOv5 and Faster R-CNN were applied to overlapping objects where the filter or kernel that are expected to be able to separate the overlapping object in the dedicated layer of applying models. A kitchen utensil benchmark image database and
... Show MoreDrilling deviated wells is a frequently used approach in the oil and gas industry to increase the productivity of wells in reservoirs with a small thickness. Drilling these wells has been a challenge due to the low rate of penetration (ROP) and severe wellbore instability issues. The objective of this research is to reach a better drilling performance by reducing drilling time and increasing wellbore stability.
In this work, the first step was to develop a model that predicts the ROP for deviated wells by applying Artificial Neural Networks (ANNs). In the modeling, azimuth (AZI) and inclination (INC) of the wellbore trajectory, controllable drilling parameters, unconfined compressive strength (UCS), formation
... Show More