Preferred Language
Articles
/
MRdcmZIBVTCNdQwCHrlh
Pragmatics of Political Blame in British and Iraqi Parliaments
...Show More Authors

This research is a pragmatic study of political blame in British and Iraqi Parliaments. It aims to unfold the similarities and/or differences in terms of the pragmatic and pragma-rhetorical strategies used by British and Iraqi politicians when they exchange blame in both offensive and defensive situations. A statistical analysis is conducted to quantitatively support the findings of the pragmatic analysis. The analyses conducted have yielded different results among blame is a process composed of two stages. Each stage is distinct for its pragmatic components and pragma-rhetorical strategies. British and Iraqi MPs at the blame stage tend to utilize impoliteness as their main strategy. However, British and Iraqi MPs perform differently at the blame avoidance stage in that British MPs employ politeness as their main defense strategy, whereas Iraqi MPs exploit impoliteness. Besides, British and Iraqi MPs at the blame stage tend to violate the maxim of quality by fabricating their statements. At the blame avoidance stage, the maxim of relevance was the most violated one through the strategy of evasion. As for pragma-rhetorical strategies, British and Iraqi politicians at the blame stage exploit the pragma-rhetorical strategy of number-game to support their credibility. At the blame avoidance stage, British politicians primarily utilize hyperbole, whereas Iraqi politicians deploy shifting blame.

Clarivate Crossref
View Publication
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Applications of the Finite Operator〖 〗_3 E_2 (■(q^(-N),a,b@c,d);q,-fθ) for the Polynomials B_n (a,b,c,d,f,x,y|q)
...Show More Authors

     In this work,   polynomials  and the finite q-exponential operator  are constructed. The operator  is used to combine an operator proof of the generating function with its extension, Mehler's formula with its extension and Roger's formula for the polynomials . The generating function with its extension,  Mehler's formula with its extension and Rogers formula for Al-Salam-Carlitz polynomials  are deduced by giving special values to polynomials .

View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
بررسیِ حرکت¬شناختیِ افعالِ متنِ "ما زِ بالاییم و بالا می رویم" مولانا Kinetic Study of Mewlana Jalaluddin Rumi's "Mazi Balaeem we Bala Mi Roeem" Text's Verbs
...Show More Authors

چکیده­ی بحث

       به نظر می­آید که عالم هستی ، بر مسأله­ی « حرکت» استوار دارد ، و روح ، همیشه دنبال دگرگونی و تکامل و برتری می­گردد. حرکت ، همه­ی چیزها در عالم إمکان را  در بر می­گیرد. حرکت در بنیادهای فکر مولانا جای مهمی دارد .اشعار مولانا مقدار زیادی از پویایی و حرکت برخوردارست، و از آنجایی که فعل ، عنصر تکانبخش جمله ، و کانون دلالت است ، ترجیح دادیم - علاوه بر دیگر عنا

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 23 2020
Journal Name
Baghdad Science Journal
A Assessment of long distance chasing photometer (NAG-ADF-300-2) by estimating the drug atenolol with ammonium molybdate via continuous flow injection analysis: drug atenolol a
...Show More Authors

     Atenolol was used with ammonium molybdate to prove the efficiency, reliability and repeatability of the long distance chasing photometer (NAG-ADF-300-2) using continuous flow injection analysis. The method is based on reaction between atenolol and ammonium molybdate in an aqueous medium to obtain a dark brown precipitate. Optimum parameters was studied to increase the sensitivity for developed method. A linear range for calibration graph was 0.1-3.5 mmol/L for cell A and 0.3-3.5 mmol/L for cell B, and LOD 133.1680 ng/100 µL and 532.6720 ng/100 µL for cell A and cell B respectively with correlation coefficient (r) 0.9910 for cell A and 0.9901 for cell B, RSD% was lower than 1%, (n=8) for the determination of ate

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Jun 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
Artistic Features Of Re-Writing The Novel "On The Eve, on The Eve" By YevgueniBobov: As an Example: Жанровые Особенности Ремейка (На Материале Романа Е. Попова «Накануне Накануне»)
...Show More Authors

 The paper tackles two topics. The first is about the term "Ремейк" which is very common in contemporary Russian literature; it has counterparts such as " Обработка" and " Переделка", where these two may indicate any of the following meanings (remake, reformulate, rewrite, treatment, modification, change). It has been shown that this term does not have a stable definition. Also, the role of this term in literary studies has been mentioned along with how it has come to its peak of use in post-modern literature.

The second is that I have taken a sample of well-known works in Russian literature " On the Eve, On the Eve " by the contemporary Russian writer YevgueniBobov, and shown the effort of the writer

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 05 2017
Journal Name
Chemical Engineering Communications
Microwave-assisted preparation of mesoporous-activated carbon from coconut (<i>Cocos nucifera</i>) leaf by H<sub>3</sub>PO<sub>4</sub>activation for methylene blue adsorption
...Show More Authors

View Publication
Scopus (100)
Crossref (96)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Modern Mathematical Sciences
Coupled Laplace-Decomposition Method for Solving Klein- Gordon Equation
...Show More Authors

In this paper, we consider a new approach to solve type of partial differential equation by using coupled Laplace transformation with decomposition method to find the exact solution for non–linear non–homogenous equation with initial conditions. The reliability for suggested approach illustrated by solving model equations such as second order linear and nonlinear Klein–Gordon equation. The application results show the efficiency and ability for suggested approach.

Preview PDF
Publication Date
Tue Dec 26 2017
Journal Name
Al-khwarizmi Engineering Journal
Fuzzy Wavenet (FWN) classifier for medical images
...Show More Authors

 

    The combination of wavelet theory and neural networks has lead to the development of wavelet networks. Wavelet networks are feed-forward neural networks using wavelets as activation function. Wavelets networks have been used in classification and identification problems with some success.

  In this work we proposed a fuzzy wavenet network (FWN), which learns by common back-propagation algorithm to classify medical images. The library of medical image has been analyzed, first. Second, Two experimental tables’ rules provide an excellent opportunity to test the ability of fuzzy wavenet network due to the high level of information variability often experienced with this type of images.

&n

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
Some Results on Reduced Rings
...Show More Authors

The main purpose of this paper is to study some results concerning reduced ring with another concepts as semiprime ring ,prime ring,essential ideal ,derivations and homomorphism ,we give some results a bout that.

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
F-Compact operator on probabilistic Hilbert space
...Show More Authors

This paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref