Depp and Heard's trial has reaped significant attention due to the domestic violence allegations directed towards each other. This paper sheds light on the repressed narrative beyond the mere words spoken aloud. It delves into an overlooked aspect, i.e., nonverbal communication. Previous studies focused on one or two categories of nonverbal communication. Therefore, the current study investigates the types and sub-types of nonverbal communication exhibited by both rivals within the courtroom setting. To examine the credibility and repressibility of nonverbal communication, the researchers have carefully watched (28) videos representing the whole trial's event. Some nonverbal communication was traced through the whole (28) videos from which (10) screenshots were purposely selected to represent nonverbal communication. In some cases, the researchers had to attract the reader's attention to the verbal communication to provide the context in which the nonverbal communication was analyzed. To achieve the aims of the study, the researchers rely on Grice's Maxims (1975) and Leonard's (2012) model of nonverbal communication, which consists of six categories with their subcategories. The results show that Depp utilized various types of nonverbal communication while Heard overused lip pressing and head movements. Depp also adhered to most of Grice's maxims, while Heard violated some. In some situations, the nonverbal communication was interpreted. In other situations, the nonverbal communication was supported or contradicted by verbal communication. Nonverbal communication cannot be controlled. If the communicator controls one or two types of nonverbal communication, it will either sound exaggerated or reveal the real intention.
A Factorial Study for separation anxiety in students, of Baghdad City
Aims: The present study aims at assessing mothers’ knowledge of breastfeeding in Kirkuk governorate,
besides determining the relationship between mothers’ knowledge and some of their demographic
attributes.
Methodolgy: A descriptive study was used the assessment approach and applied on mothers in Kirkuk
governorate from January 15th 2011 to July 25th
, 2011. Non-probability sampling a convenience sample of
(72) mothers, attending pediatric general hospital in Kirkuk governorate for following up the health status
of their children, was selected for the purpose of the study. A questionnaire was developed for the
purpose of the study. It was comprised of two parts; the first part includes the mothers' demographic
Paronomasia is a recognized rhetorical device by which poets could play with words that are similar or identical in form but different in meaning. The present study aims to identify paronomasia in Arabic and English. To achieve the aim of the study, a corpus of selected verses chosen from two famous figures in Arabic and English literatures and analyzed thoroughly. The analysis of data under investigation reveals that paronomasia is a crucial aid used by poets to portrait the real world as imaginative. It further shows that the concept of paronomasia in English is not the same as in Arabic. In English, there are echoes of the Arabic jinās, i.e., there are counterpart usages of similar devices, yet English rhetoricians have not defined or c
... Show MoreThe present study is a linguistic study of comment clauses in the American Series „Friends‟ .Comment clauses refer to those clauses which comment on the content of the main clause or the attitude of the speaker towards the way of speaking .The problem of this study is to answer the following questions ; what types of comment clauses can be used in the face- to –face conversations , for what functions these comment clauses could be used , and how these comment clauses are used by the participants of these conversations . This study is a qualitative one . The study aims to investigate the types of comment clauses used in the American Series “Friends‟. The study also aims to investigate the pragmatic functions of these comment clause
... Show MoreThe formula is effective in Surat Nisa
(A study of gramophone)
in the name of o Allah the Merciful
Praise be to Allah, Lord of the Worlds, and prayers and peace be upon the Seal of the Prophets and Messengers. The envoy is a mercy to the worlds Muhammad Sadiq Al - Amin and to the pure and good companions of the Tayyibites.
The formula of the morphological formulas, which have diverged from other meanings, whether lexicon or contextual and what this formula contains many meanings (effective source) and (effective in the sense of effective) and (effective sense reactor) and (effective sense) and ( (F) in the sense of a similar character) and ((the name of the) (collect). This was dealt with in the formula in Surat al-Nisaa
The present paper is a qualitative descriptive study. It aims to examine the macro-cultural schemata addressing the concept of violence against women in Iraq from a cognitive linguistic point of view. To meet this objective, a number of Iraqi social caricatures have been selected from two popular and active Iraqi caricaturists, Odeh Al-Fahdawi and Nasser Ibrahim. The selection and the analysis of data have been achieved following the validity and reliability procedures and the ethical considerations. To meet this objective, Sharifian’s Model (2011) of Cultural Schemata has been adopted in data analysis. The study has concluded that the macro-cultural schemata regarding the concept of violence in the selected panels reveals that violenc
... Show MoreThe current study aims to identify the needs in the stories of the Brothers Grimm. The research sample consisted of (3) stories, namely: 1- The story of the Thorn Rose (Sleeping Beauty) 2- The story of Snow White 3- The story of Little Red Riding Hood. The number of pages analyzed reached (15.5) pages, and to achieve the research objectives, Murray's classification of needs was adopted, which contains (36) basic needs that are further divided into (129) sub-needs. The idea was adopted as a unit of analysis and repetition as a unit of enumeration, Reliability was extracted in two ways: 1- Agreement between the researcher and himself over time, where the agreement coefficient reached 97%. The second was agreement between the researcher and tw
... Show MoreCohesion is well known as the study of the relationships, whether grammatical and/or lexical, between the different elements of a particular text by the use of what are commonly called 'cohesive devices'. These devices bring connectivity and bind a text together. Besides, the nature and the amount of such cohesive devices usually affect the understanding of that text in the sense of making it easier to comprehend. The present study is intendedto examine the use of grammatical cohesive devicesin relation to narrative techniques. The story of Joseph from the Holy Quran has been selected to be examined by using Halliday and Hasan's Model of Cohesion (1976, 1989). The aim of the study is to comparatively examine to what extent the type
... Show MoreThis piece of research deals with assimilation as one of the phonological processes in the language. It is a trial to give more attention to this important process in English language with deep explanation to its counterpart in Arabic. in addition, this study sheds light on the points of similarities and differences concerning this process in the two languages. Assimilation in English means two sounds are involved, and one becomes more like the other.
The assimilating phoneme picks up one or more of the features of another nearby phoneme. The English phoneme /n/ has t
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show More