The present study aims at scrutinizing the impoliteness types, causes, and purposes utilized by Iraqi English language learners when refusing marriage proposals. Thus, it attempts to answer the questions: (1) what are the impoliteness formulas used by the Iraqi learners of English in refusing marriage proposals?, and (2) What are their impoliteness triggers/causes and the purposes? The study is significant in bridging the gap that few linguistic types of research concentrate on studying intentionality and emotions allied with impoliteness. Data were collected from 35 Iraqi learners of English responding to 6 situations of marriage. The data were analyzed using Culpeper’s (2011) formulas of impoliteness and Bousfield’s (2007) impoliteness triggers and intentions. The findings revealed that the most regular impoliteness formulas were insults and pointed criticisms/complaints. Regarding impoliteness triggers, the Iraqi learners’ responses reflected anger and disapproval as the most common triggers of impoliteness. Lastly, impoliteness was utilized as an instrument of insulting, quipping, and showing grudge when refusing the marriage situations; however, some impoliteness occurred as a counseling technique. The study concludes with some recommendations for future works.
Polarization modulation plays an important role in polarization encoding in quantum key distribution. By using polarization modulation, quantum key distribution systems become more compact and more vulnerable as one laser source is used instead of using multiple laser sources that may cause side-channel attacks. Metasurfaces with their exceptional optical properties have led to the development of versatile ultrathin optical devices. They are made up of planar arrays of resonant or nearly resonant subwavelength pieces and provide complete control over reflected and transmitted electromagnetic waves opening several possibilities for the development of innovative optical components. In this work, the Si nanowire metasurface grating polarize
... Show Morelarization modulation plays an important role in polarization encoding in quantum key distribution. By using polarization modulation, quantum key distribution systems become more compact and more vulnerable as one laser source is used instead of using multiple laser sources that may cause side-channel attacks. Metasurfaces with their exceptional optical properties have led to the development of versatile ultrathin optical devices. They are made up of planar arrays of resonant or nearly resonant subwavelength pieces and provide complete control over reflected and transmitted electromagnetic waves opening several possibilities for the development of innovative optical components. In this work, the Si nanowire metasurface
... Show MoreJurisprudential disagreements are a significant source of a vast jurisprudential wealth. Among the manifestations of these disagreements are scholarly critiques raised by some scholars against others, claiming their divergence from the legal evidence or established principles for deducing legal rulings. One such critique is presented by the narrator scholar Abu Bakr Ibn Abi Shaybah, may Allah have mercy on him, directed towards Abu Hanifah al-Nu‘man, may Allah have mercy on him. In his compilation, Ibn Abi Shaybah cited numerous hadiths and traditions that he considered conflicting with the judgments as perceived by Imam Abu Hanifah, may Allah have mercy on him. These issues cover various branches of jurisprudence, including worship, sale
... Show MoreAbstract:
The study focused on the application of smart tourism as one of the applications of electronic commerce in the form of (B2C) to attract tourists to Saudi Arabia, where the tourism sector is one of the important sectors on which the Kingdom depends on the diversity of its economy.
The purpose of the research: With the issuance of tourist visas for the first time the study noted a deterioration in the case of Saudi tourist sites over the Internet, which do not live up to this great interest by the Saudi government for this sector, which became vital to them. The study tried to identify the reality of the Saudi tourist sites through the Internet in order to identify the sui
... Show MoreThis study is planned to find relationship between interleukin-33 (IL-33) with its receptor interleukin-1 receptor 4 (IL-1R4), and assurance IL-33/IL-1R4 proportion as biomarker to atherosclerosisin rheumatoid arthritis (RA) Iraqi females patients with and without dyslipidemia. This study was attempted at Baghdad Teaching Hospital included 60 females patients with RA that were isolated into: 30 patients with dyslipidemia(G2), 30 patients without dyslipidemia(G3) and 30 individual as control group (G1) .Patients were experiencing treatment by methortexiene medication, analyzed by rheumatoid factor(RF) and erythrocyte sedimentation rate( ESR) tests. All patients and control groups age ranged from (30-55) years. The results sho
... Show MoreThis study is planned to find relationship between interleukin-33 (IL-33) with its receptor interleukin-1 receptor 4 (IL-1R4), and assurance IL-33/IL-1R4 proportion as biomarker to atherosclerosisin rheumatoid arthritis (RA) Iraqi female’s patients with and without dyslipidemia. This study was attempted at Baghdad Teaching Hospital included 60 female’s patients with RA that were isolated into: 30 patients with dyslipidemia(G2), 30 patients without dyslipidemia(G3) and 30 individuals as control group (G1). Patients were experiencing treatment by methortexiene medication, analyzed by rheumatoid factor (RF) and erythrocyte sedimentation rate (ESR) tests. All patients and control groups age ranged from (30-55) years. The results show an inc
... Show MoreIn this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate ( 75-86) that differentiates according to length of message and image resolution
BN Rashid, International Journal of Research in Social Sciences and Humanities, 2019 - Cited by 1
In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate ( 75-86) that differentiates according to length of message and image resolution.