Characterization is commonly known in stylistics to be the cognitive process in the readers' minds when comprehending a fictional character in a literary work .In one approach, it is assumed that characters are the outcome of the interaction between the words in the text on the one hand and the contents of our heads on the other. This paper is an attempt to understand how characterization is achieved by applying Culpeper’s (2001) model which seems to be to present a method of analysis that is more objective and more systematic in analyzing characters. Two characters are selected for discussion; Ralph and Jack from Golding’s (1954) Lord of the Flies. The novel talks about the corruption of human beings and the capacity of evil they have. The results show that Ralph and Jack are antithetical in many aspects; Ralph represents the rational civilized boy whereas Jack represents the savage brutal boy.
The structure of the interrogation process in cross-examinations is said to be diverse and complex in terms of question-response typology. This is because the counsel has to extract truth from an opposing party’s witness whose views are expected to advocate that party's views regarding the case. Accordingly, the study which is basically quantitative in nature aims to investigate what the examining party intends to obtain out of these questions and which of these questions are the most prevalently used. It also aims to measure the amount of cooperativity in witnesses' responses. Accordingly, three transcripts of cross-examination have been analyzed, using a pragmatically-oriented approach. The approach draws on Stenstorm (1984) and Arch
... Show MoreMRY *Khalid Sh. Sharhan, *Naseer Shukur Hussein, INTERNATIONAL JOURNAL OF DEVELOPMENT IN SOCIAL SCIENCE AND HUMANITIES, 2021
This systematic review aimed to analyse available evidence to answer two focused questions about the efficacy of erythritol powder air‐polishing (EPAP) (i) as an adjunctive during active periodontal therapy (APT) and (ii) as an alternative to hand/ultrasonic instrumentation during supportive periodontal therapy (SPT). Additionally, microbiological outcomes and patient's comfort/perceptions were assessed as secondary outcomes.
PubMed, Cochrane and Medline were searched for relevant articles published before February 2021 following PRISMA guidelines. The search was conducted by three indep
This study numerically intends to evaluate the effects of arc-shaped fins on the melting capability of a triplex-tube confinement system filled with phase-change materials (PCMs). In contrast to situations with no fins, where PCM exhibits relatively poor heat response, in this study, the thermal performance is modified using novel arc-shaped fins with various circular angles and orientations compared with traditional rectangular fins. Several inline and staggered layouts are also assessed to maximize the fin’s efficacy. The effect of the nearby natural convection is further investigated by adding a fin to the bottom of the heat-storage domain. Additionally, the Reynolds number and temperature of the heat-transfer fluid (HTF) are e
... Show MoreThe Ratawi Oil Field (ROF) is one of Iraq's most important oil fields because of its significant economic oil reserves. The major oil reserves of ROF are in the Mishrif Formation. The main objective of this paper is to assess the petrophysical properties, lithology identification, and hydrocarbon potential of the Mishrif Formation using interpreting data from five open-hole logs of wells RT-2, RT-4, RT-5, RT-6, and RT-42. Understanding reservoir properties allows for a more accurate assessment of recoverable oil reserves. The rock type (limestone) and permeability variations help tailor oil extraction methods, extraction methods and improving recovery techniques. The petrophysical properties were calculated using Interactive Petroph
... Show MoreThis study aimed to investigate the role of Big Data in forecasting corporate bankruptcy and that is through a field analysis in the Saudi business environment, to test that relationship. The study found: that Big Data is a recently used variable in the business context and has multiple accounting effects and benefits. Among the benefits is forecasting and disclosing corporate financial failures and bankruptcies, which is based on three main elements for reporting and disclosing that, these elements are the firms’ internal control system, the external auditing, and financial analysts' forecasts. The study recommends: Since the greatest risk of Big Data is the slow adaptation of accountants and auditors to these technologies, wh
... Show MoreCoronavirus disease (Covid-19) has threatened human life, so it has become necessary to study this disease from many aspects. This study aims to identify the nature of the effect of interdependence between these countries and the impact of each other on each other by designating these countries as heads for the proposed graph and measuring the distance between them using the ultrametric spanning tree. In this paper, a network of countries in the Middle East is described using the tools of graph theory.
A new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreLower extremity exoskeletons can assist with performing particular functions such as gait assistance, and physical therapy support for subjects who have lost the ability to walk. This paper presents the analysis and evaluation of lightweight and adjustable two degrees of freedom, quasi-passive lower limb device to improve gait rehabilitation. The exoskeleton consists of a high torque DC motor mounted on a metal plate above the hip joint, and a link that transmits assistance torque from the motor to the thigh. The knee joint is passively actuated by spring installed parallel with the joint. The action of the passive component (spring) is combined with mechanical output of the motor to provide a good control on the designed exoskeleton whi
... Show More