The present study cognitive aims to investigate the negation phenomenon in American political discourse under Critical Discourse Analysis (CDA) principles. The research sample includes two speeches given by Clinton and Trump in their election campaigns in 2016. Since the nature of the study follows the social-cognitive approach, the researcher adopted two models of analysis to achieve the study’s objectives: First, the theoretical framework of MST (developed by Fauconnier (1994), Fauconnier and Sweetser (1996) to examine meaning construction resulting from building different levels of negative mental spaces by two different genders the selected speeches. Second, pragmatic model to examine the role of gender from the functional perspective of negation, five pragmatic strategies here are adopted, namely, Speech Act, off-record, on-record, presupposition (based on the politeness model of Brown and Levinson, 1987), and violation of Grice’s maxims (1975). The study follows a qualitative method in the analytical interpretation of data to understand the negative impact of a contextual model and subjective model (personal ideology and knowledge) and quantitative analysis to find out the frequencies and the types of negatives. The findings show that both genders are biased to use negatives in their election campaigns to damage f each other’s face, and both similarly succeed in using pragmatic strategies within the scope of negative spaces, with some differences to mention.
The present study aimed to identify the exact location and its relation to cognitive
method (risk_caution) to university students. The sample consisted of (300) students who
were chosen randomly and equally. The study results indicated that students possess an
internal exact location and they also use risk cognitive method. The study also indicated that
there is a prophesies which is an exact location for others to reach to caution cognitive
method. Depending on these results, the study recommended to benefit from the results of the
study variables and from the measurement of the exact location and method of cognitive
(risk_caution) to identify male and female students and especially by consulting units at
college
The aim of the research is to identify the cognitive method (rigidity flexibility) of third-stage students in the collage of Physical Education and Sports Sciences at The University of Baghdad, as well as to recognize the impact of using the McCarthy model in learning some of skills in gymnastics, as well as to identify the best groups in learning skills, the experimental curriculum was used to design equal groups with pre test and post test and the research community was identified by third-stage students in academic year (2020-2021), the subject was randomly selected two divisions after which the measure of cognitive method was distributed to the sample, so the subject (32) students were distributed in four groups, and which the pre te
... Show MoreOne of the main environmental problems which affect extensively the areas in the world is soil salinity. Traditional data collection methods are neither enough for considering this important environmental problem nor accurate for soil studies. Remote sensing data could overcome most of these problems. Although satellite images are commonly used for these studies, however there are still needs to find the best calibration between the data and real situations in each specified area. Landsat satellite (TM & ETM+) images have been analyzed to study soil pollution (Exacerbation of salinity in the soil without the use of abandoned agricultural for a long time) at west of Baghdad city of Iraqi country for the years 1990, 2001 & 2007. All of the th
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreIn spite of the foundation of Iraqi state in 1921 and the formation of the new features of
the modern state, however, the inherited costumes and traditions sustained in the conservative
society. But due to the development that inflicted to the Iraqi society and the development of
the staff in all fields and requirement conducting to female learning. After WW II and the
1950s, women get out of their houses to seek learning by approaching the doors.
What is positive about that phase was the formation of the College of Queen A'liya
which is regarded as a positive indicator. In any case the Iraqi family encouraged women to
be indulged in higher education. Calling the college Queen A'liya
The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show MoreThis research aims at analysing epitaphs written by Thomas Moore for the memory of Rupert Southey, the epitaph is analysed linguistically and stylistically on four levels graphology, phonology, morphology, and lexico-syntax level to explore the elements that the writer uses the most at each level. Bearing in mind Nowottny approach (1962) (to text analysis) who believes that the linguistic analysis of a literary text is not just a marginal but a necessity” (Bakuuro etal., 2018:34). The researcher has selected and analysed a written epitaph of famous individual associated with English, literature. The study involves both literary and linguistic analysis, with much more concentration through the analysis on the aspect of linguistics. In fact
... Show MoreThe present study attempts to give a detailed discussion and analysis of parenthetical constructions in English and Arabic, the aim being to pinpoint the points of similarity and difference between the two languages in this particular linguistic area.The study claims that various types of constructions in English and Arabic could be considered parenthetical; these include non-restrictive relative clauses, non-restrictive appositives, comment clauses, vocatives, interjections, among others. These are going to be identified, classified, and analyzed according to the Quirk grammar - the approach to grammatical description pioneered by Randolph Quirk and his associates, and published in a series of reference grammars during the 1970
... Show More