Hyperbole is an obvious and intentional exaggeration in the sense that it takes things to such an extreme that the audience goes too far and then pulls itself back to a more reasonable position, i.e. it is an extravagant statement or figure of speech not intended to be taken literally. This paper focuses on the formal and functional perspectives in the analysis of hyperbole which American candidates produce in their speeches in electoral campaigns, for it is hypothesized that candidates in their electoral campaigns use hyperbolic expressions excessively to persuade voters of the objectives of their electoral campaign programs. Hence, it aims to analyze hyperbole in context to determine the range of pragmatic func
... Show MoreProviding Iraqi students with proficiency in English is the ultimate goal of the educational system which is a way of getting knowledge in the fields of arts, sciences, transferring knowledge and sciences to other communities. Therefore, conducting such a type of study is very important because the contents of English textbooks have a huge influence on learning of the students. Once the content of English textbooks contain errors as the correct one, this will effect on his/her learning. The present study is an attempt to evaluate the new course entitled “English for Iraq” for fifth grade students for secondary schools, by Olivia Johnston and Mark Farell. It aims to answer eleven questions relating to the following domains: strength, obj
... Show MoreThe study aims to investigate the degree of student teachers at Sultan Qaboos University acquired skills in teaching Arabic via a virtual micro-teaching lab, as well as to reveal the difficulties they faced and their development proposals. To do this, the researchers developed a questionnaire divided into four dimensions: planning, implementation, evaluation, and
ethical values for the teaching profession, in addition to two open-ended questions to identify difficulties and suggestions. It was administered to (30) student teachers. The results revealed that the average degree of student-teacher acquisition of skills was high in its four dimensions. It ranged between (39.2) to (82.2), while the overall average was (56.2).
... Show MoreThe occupier’s civil liability in English law is considered as one of the main types of the responsibility imposed by the law of Torts. and is regarded as a special system of the civil liability arising from negligence, as well as two other systems, that is to say , the employer’s non-contractual liability and The liability from defective products. It is worth-bearing in mind that the common law has imposed on the occupier of the premises a duty of safety towards those who enter his premises. And two English legislations have been enacted later to regulate this type of liability legislatively, namely, the Occupier's liability Act 1957 and the Occupier's liability Act 1984. Whereas the Iraqi civil law No. 40 of 1951 has regulate
... Show MoreIn this research want to make analysis for some indicators and it's classifications that related with the teaching process and the scientific level for graduate studies in the university by using analysis of variance for ranked data for repeated measurements instead of the ordinary analysis of variance . We reach many conclusions for the
important classifications for each indicator that has affected on the teaching process. &nb
... Show MoreThe aim of the current research is to recognizing the impact of mind and informational strategy on the achievement with the second intermediate students in the grammar of arabic language, the researcher used a partial-set experimental design and intentionally selected a sample out of the second intermediate class from (AL- Markazya Intermediate school) in the district of Hilla, affiliated which belongs to General Directorate of Babylon Education in the year (2020-2021) for applying the experiment. The sample was composed of (50) students, (25) ones for each group, the experimental group and normal one. The researcher balanced between the two groups in various changes including: (the chronological age counted by months, the academic achie
... Show MoreBrucellosis is one of the five common bacterial zoonoses in the world caused by
organisms belonging to the genus Brucella. Immune recognition of bacterial
infection may contribute to cytokine, as well as antibody production that are
characteristic of innate and adaptive responses. In this study, the presence of
attenuated live Brucella melitenses Rev1 bacteria or its DNA induced the immune
system to produce IFN-γ and anti-ds DNA antibody. In respect to IFN-γ released,
the B. melitensis Rev 1 attenuated live vaccine was able to stimulate the immune
system more than the DNA (P≤0.05). Such finding could be attributed to the whole
attenuated bacteria that have immunogenic factors other than the DNA like cell wall<
The theories and applications of speaker identification, recognition, and verification are among the well-established fields. Many publications and advances in the relevant products are still emerging. In this paper, research-related publications of the past 25 years (from 1996 to 2020) were studied and analysed. Our main focus was on speaker identification, speaker recognition, and speaker verification. The study was carried out using the Science Direct databases. Several references, such as review articles, research articles, encyclopaedia, book chapters, conference abstracts, and others, were categorized and investigated. Summary of these kinds of literature is presented in this paper, together with statistical analyses
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show More