Preferred Language
Articles
/
ZBgurJQBVTCNdQwCdR6e
Emotional Blackmail in Breaking Bad Series: A Pragma-Stylistic Study
...Show More Authors

Although language research has focused on blackmail in general, less attention has been paid to emotional blackmail. To date, researchers could not locate any literature that examines emotional blackmail from a linguistic standpoint. The current study is intended to fill this gap by scrutinizing emotional blackmail from a pragma-stylistic point of view by examining the style of the characters in selected episodes extracted from the American Breaking Bad series. To carry out the study, an eclectic model comprising kinds of emotional blackmailers by Forward and Frazier (1997), Searles’ speech acts (1979), Grice’s maxims (1975), Brown and Levinson’s politeness (1987), Culpeper’s impoliteness (1996), and Simpson’s stylistic levels (2004) will be used. The study examines how emotional blackmailers reflect themselves through language and how different pragmatic theories contribute to detecting emotional blackmail. The pragma-stylistic analysis reveals that emotional blackmailers use different pragmatic and stylistic elements. Pragmatically, the analysis demonstrates that punishers more frequently utilize commissive speech acts, whereas sufferers more frequently use representative and expressive speech acts. Besides, the punishers’ speech is realized by breaching the quantity and manner maxims whereas the sufferer’s speech is manifested by breaching the quantity and quality maxims. Concerning (im)politeness, the punishing behavior is accomplished by positive politeness, negative impoliteness, bold on-record impoliteness, and positive impoliteness while the suffering behavior is accomplished through positive politeness. Stylistically, the language used to talk about suffering is associated with discomfort and unhappiness. Concerning grammar, the punishing discourse emphasizes threats through fronting strategies. With suffering, negative auxiliaries are used.

Scopus Crossref
View Publication
Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
Publicizing the survey image in local consumer protection the mission program is a model
...Show More Authors

The investigative film is part of the documentary films and is considered one of the important films that have a high viewership by the recipient, which is of great importance in transmitting information and contributing to creating awareness of the community through the advertising function performed by the cinematic image, as the researcher addresses the concept of advertising and its development through the time stages. And advertising functions. Then the researcher dealt in his research with the cinematic technical elements that contribute to the success of the investigative advertising work, such as camera movements, music, sound effects, dialogue ... etc., which enrich the investigative picture with realism and the flow of informat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Factors Associated with Anemia in A sample of Pregnant Women Attending Primary Health Centers
...Show More Authors

Objective (s): To determine proportion of anemia among sample of Pregnant women. To identify factors
associated with the anemia (Maternal age, maternal education, gestational age, parity, gravidity, birth
interval, smoking, taking iron supplements and dietary habits).
Methodology: A cross-sectional study conducted at Al- washash & Bab-almoadham primary health care
centers. The sample was selected by (non-probability convenient sampling) and sample size was (550).
The study started from 1st March 2011 to 30th of March 2012. The data was collected by direct interview
using special questionnaire to obtained socio-demographic information.
Results: the result shows that mean age of the subjects was 26.5± 7.5 years, 8

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
A modified Mobilenetv2 architecture for fire detection systems in open areas by deep learning
...Show More Authors

This research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.

Scopus Crossref
Publication Date
Wed Jan 30 2013
Journal Name
Al-kindy College Medical Journal
Relationship between screen watching and overweight or obesity in a Sample of Iraqi adolescents
...Show More Authors

Background: Obesity represents a clear and
present danger to the health of children and
adolescents. Its prevalence among American
youth has doubled in the past 3 decades, and
there are now more overweight and obese
adults in the United States than adults of
normal weight.
Objectives of the study:
1- Finding whether screen watching among
adolescents has an effect on increasing
prevalence overweight and obesity.
2- The effect of other variables like physical
activity, eating in front of screen, eating under
stress on obesity and overweight among the
subjects sample.
Patients &Methods: During 3 months period a
cross sectional survey was conducted on 4
high schools at Baghdad with total

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 20 2011
Journal Name
Journal Of Planner And Development
Architectural void is a revolution in the formation of the facades of digital architecture
...Show More Authors

Architecture has evolved through the ages as forms, relationships, materials and mechanisms according to the data of each era and up to the era of digital technology, where the change in proportions and aesthetic dimensions of contemporary architectural formation due to the capabilities of digitization has created innovative plastic properties using the void formation in the facades and the introduction of void as a formative and aesthetic element, which led to The emergence of new creative concepts and ideas that contradict traditional ideas and are consistent with the spirit of the times, led to a revolution in the world of architectural form at the level of (architectural ideas and the generation of shapes, materials and construction

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 01 2011
Journal Name
J Clin Exp Invest Www. Clinexpinvest. Org Vol
Oral zinc sulphate in treatment of patients with thallium poisoning: A clinical therapeutic trial
...Show More Authors

KE Sharquie, KI Al-Hamdi, AA Noaimi, AA Al-Mohammadi, J Clin Exp Invest www. clinexpinvest. org Vol, 2011 - Cited by 1

View Publication
Publication Date
Wed Jun 03 2020
Journal Name
Political Sciences Journal
The presidential system in Turkey between reality and challenges: a vision of the future
...Show More Authors

The nature of the political system of any country in the international system must have an impact on the policy of the State, whether in the interior or exterior, both regional and international, Turkey is one of the most important countries in the Middle East, which have a place and effectiveness on the surrounding environment, hence the importance of research lies in its political system and the transfer of power in it and its transformation from the form of the parliamentary system to the presidential system of the repercussions of the task and mutual effects between Turkey and the countries of the surrounding region in terms of the extent of achieving political stability in the Turkish interior or not and how this can be refl

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 16 2023
Journal Name
Political Sciences Journal
The Dens of Extremism and Terrorism in Syrian Camps (Al-Hol as a model)
...Show More Authors

 

After the defeat of the military terrorist organization "ISIS" and the fall of the throne of its alleged state in the Iraqi city of Nineveh, in Syrian Baghouz, and the end of its control over the land, the Syrian camps, especially "Al-Hol" camp, emerge as an incubator for the ideology of the terrorist organization "ISIS" and a vital base for its consolidation and dissemination, which includes (68,000- 73,000) people. During the years following the military defeat of (ISIS), the camp witnesses the spread of extremist ideas widely at the hands of its residents, including the families of the organizations dead's, extremist detainees, and those who deal with it, taking advantage of the deterioration of the environmental, se

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 28 2023
Journal Name
Journal Of Advanced Pharmaceutical Technology & Research
Development of a spectrophotometric analytical approach for the measurement of cefdinir in various pharmaceuticals
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.