Preferred Language
Articles
/
jcoeduw-1053
A Study of Person Deixis in J. M. Singe's Riders to the Sea
...Show More Authors

This study deals with an important area in the field of linguistics, namely person deixis.
The study aims at: (1) Describing the notion of deixis, its importance, and its place in the field
of linguistics, (2) Presenting a detailed illustration of person deixis, and (3) Conducting an
analysis of person deixis in one of Synge‟s plays Riders to The Sea according to Levinson‟s
model. The most important aim of these three is the third one (the analysis). To achieve this
aim, the researcher depends on Levinson‟s (1983) descriptive approach. According to the
descriptive approach of deixis, the category of person deixis can be defined as the encoding of
the participant roles in the speech situation. This encoding is represented by the use of
pronouns and vocative forms. After conducting the analysis of the literary text, the researcher
will find the frequency of occurrences of the category of person deixis in the whole text.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Planning the Production of the Electrical Distribution Converter (400KV/11) Using Time Series Methods and Goal Programming in the Fuzzy Environment
...Show More Authors

This Paper aims to plan the production of the electrical distribution converter (400 KV/11) for one month at Diyala Public Company and with more than one goal for the decision-maker in a fuzzy environment. The fuzzy demand was forecasting using the fuzzy time series model. The fuzzy lead time for raw materials involved in the production of the electrical distribution converter (400 KV/11) was addressed using the fuzzy inference matrix through the application of the matrix in Matlab, and since the decision-maker has more than one goal, so a mathematical model of goal programming was create, which aims to achieve two goals, the first is to reduce the total production costs of the electrical distribution converter (400 KV/11) and th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 02 2013
Journal Name
Iraqi Medical Journal
Etiology and Antibiotic Sensitivity for Otitis Media in A Central Pediatric Teaching Hospital.
...Show More Authors

Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Theory And Practice In Language Studies
Constructing Carcinogen Risk in Scientific Discourse Through Ideological Conflict: A Cognitive Pragmatic Analysis
...Show More Authors

With the increasing rates of cancer worldwide, a great deal of scientific discourse is devoted to arguments and statements about cancer and its causes. Scientists from different fields try to seize any available chance to warn people of the risk of consuming and exposing to carcinogens that have, unfortunately, become essential parts of modern life. The present paper attempts to investigate the proximization strategy through which scientists construct carcinogen risk to enhance people’s preventive actions against these carcinogens. The paper targets the construction which depends on producing the conflict between the values of the people themselves and the contrasting values assigned to carcinogens. To achieve this aim, Cap’s (2

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Toward Improving BIM Acceptance in FM: A Conceptual Model Integrating TTF and TAM
...Show More Authors

Substantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Al Adab Journel
Gender Struggle and Women's Predicament in Tennessee Williams' A Street Car named Desire
...Show More Authors

Abstract The aim of this paper is to shed light on the theme of Gender Struggle and Women’s Predicament in Tennessee Williams’ A Street Car Named Desire .The paper tries to show William's dealings with the critical social themes like Men's Brutality and women's predicament. The paper exposes the complete shift of the balance of power between the genders in America after the two world wars. Williams illustrates society’s changing attitudes towards masculinity and denounces the society's attitudes towards women in America at that time. He rebels against the cruelty of the modern age and regrets the disintegration of the values of the south and their being replaced by the disruptive forces of modern life. In the end of the play, brutalit

... Show More
Publication Date
Thu Dec 01 2016
Journal Name
Swarm And Evolutionary Computation
A new multi-objective evolutionary framework for community mining in dynamic social networks
...Show More Authors

View Publication
Scopus (26)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Applied Nursing Research
Examining perceived and actual diabetes knowledge among nurses working in a tertiary hospital
...Show More Authors

View Publication
Scopus (30)
Crossref (31)
Scopus Clarivate Crossref
Publication Date
Mon Dec 01 2025
Journal Name
Al-khwarizmi Engineering Journal
Object Dimension and Location Determination in Gantry Robots and Conveyor Systems: A Review
...Show More Authors

A​‍​‌‍​‍‌ gantry robot is one of the most common types of industrial robots with linear movement. This type of robot is also known as a Cartesian or linear robot. It is an automated industrial system that moves along linear paths, enabling it to create a 3D envelope of the space in which it operates. A robot of this type has a standardised configuration process because it can have several sets of axes, such as X, Y and Z. The gantry robot picks up products from several places, so it can search through various locations. Afterwards, it carefully deposits the products on a conveyor belt for the next stage of the procedure or final ​‍​‌‍​‍‌shipment. This integration enables continuous and automated material flow

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus