Preferred Language
Articles
/
jcoeduw-1500
A Pragmatic Analysis of Questions and Responses in American Defense Attorneys' Cross-examinations: رحاب عبد الجليل سعيد العطار
...Show More Authors

The structure of the interrogation process in cross-examinations is said to be diverse and complex in terms of question-response typology. This is because the counsel has to extract truth from an opposing party’s witness whose views are expected to advocate that party's views regarding the case. Accordingly, the study which is basically quantitative in nature aims to investigate what the examining party intends to obtain out of these questions and which of these questions are the most prevalently used. It also aims to measure the amount of cooperativity in witnesses' responses. Accordingly, three transcripts of cross-examination have been analyzed, using a pragmatically-oriented approach. The approach draws on Stenstorm (1984) and Archer's (2005) classification of questions; Stenstorm (1984) and Archer's (2002) classificatory scheme of responses which is based on the strategies of violating Grice's (1975) maxims to determine the degree of cooperation on the part of respondents. The analysis revealed a diversity in the attorneys' method, making the use of four types of leading questions as well as non-leading ones represented by WH questions. The latter recorded the least percentage in comparison with the overall percentage of leading questions. That is; a preference is shed on the part of cross-examining counsel towards leading over non-leading questions. Moreover, the majority of the responses given have indicated the witnesses' commitment to the purpose and format of the questions posed, showing a high level of cooperativity on the part of those witnesses

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 05 2020
Journal Name
Iop Conference Series: Materials Science And Engineering, Volume 1067
The effect of cyclic loading on the nonlinear response of structural concrete members with arbitrary cross-sectional shapes
...Show More Authors

View Publication
Publication Date
Wed Oct 28 2015
Journal Name
International Journal Of Medicine And Pharmaceutical Sciences (ijmps
THE STUDY OF NUCLEAR REACTIONS FOR PRODUCTION OF ISOTOPES FOR MEDICAL RADIOACTIVE ARSENIC BY USING DIFFERENT CROSS SECTIONS
...Show More Authors

This presented study is to make comparison of cross sections to produce 71As, 72As, 73As and 74As via different reactions with particle incident energy up to 60 MeV of alpha 100 MeV of proton as a part of systematic studies on particle-induced activations on enriched Ge, Ga, Rb and Nb targets and neutron capture. Theoretical calculation of production yield, and suggestion of optimum reaction to produce 71As, 72As, 73As and 74As, based on the main published and approved experimental results of excitation functions were calculated.

Preview PDF
Publication Date
Sun Oct 02 2011
Journal Name
The Iraqi Journal Of Agricultural Sciences
AN ECONOMIC ANALYSIS OF PRODUCTION AND CONSUMPTION OF SUGAR CANE AND SUGAR BEET IN IRAQ
...Show More Authors

In spite of economic importance of sugar cane and sugar beet as they described as industrial crops they still face decreasing rates of production and productivity in Iraq , and their production was not able to satisfy the local industrial demands for sugar . Thus this study aimed at studying and analyzing, production and productivity of sugar cane and sugar beet in Iraq and this has been done by using non serial data that can be obtained from official offices in Iraq . The area and production of sugar cane in Iraq recorded positive annual growth rates during 1970- 1978 which were 6% and 5% consequently , while the productivity of sugar cane recorded at the same duration of time negative annual growth rate which was 1% , while they recorded

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 01 2024
Journal Name
Kurdish Studies
The Jurisprudence of Clans in the Balance of Social Jurisprudence (Criticism and Analysis)
...Show More Authors

It is known that the science of jurisprudence is one of the most important Islamic sciences. Because it is a science that regulates the life of man and society and provides them with happiness in this world and the hereafter, if they follow its provisions with precision and care. The importance of this topic lies in the fact that it represents an urgent social need to show the compatibility of tribal customs with social jurisprudence. The job of the jurists was and still is to clarify the legal rulings according to what the Holy Qur’an has shown, and what has been reported on the authority of the Great Prophet (6) and the pure imams (:).It is no secret to everyone that the Islamic civilization is (the civilization of jurisprudence), just

... Show More
View Publication
Publication Date
Tue Nov 15 2022
Journal Name
Nasaq Journal
Componential Analysis of Hatred Synonymy in the Lexicons of English and Standard Arabic
...Show More Authors

ABSTRACT This paper has a three-pronged objective: offering a unitary set of semantic distinctive features to the analysis of nominal “hatred synonyms” in the lexicon of both English and Standard Arabic (SA), applying it procedurally to test its scope of functionality crosslinguistically, and singling out the closest noun synonymous equivalents among the membership of the two sets in this particular lexical semantic field in both languages. The componential analysis and the matching procedures carried have been functional in identifying ten totally matching equivalents (i.e. at 55.6%), and eight partially matching ones (i.e. at %44.4%). This result shows that while total matching equivalences do exist in the translation of certain Eng

... Show More
View Publication
Publication Date
Sat Jul 01 2017
Journal Name
International Journal Of Computer Networks And Wireless Communications
Performance Analysis of VoIP in Wireless Networks
...Show More Authors

Voice over Internet Protocol (VoIP) is important technology that’s rapidly growing in the wireless networks. The Quality of Service (QoS) and Capacity are two of the most important issues that still need to be researched on wireless VoIP. The main aim of this paper is to analysis the performance of the VoIP application in wireless networks, with respect to different transport layer protocols and audio codec. Two scenarios used in the simulation stage. In the first scenario VoIP with codec G.711 transmitted over User Datagram Protocol (UDP), Stream Control Transmission Protocol (SCTP), and Real-Time Transport Protocol (RTP). While, in the second scenario VoIP with codec G.726 transmitted over UDP, SCTP, and RTP protocols. Network simulator

... Show More
View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Environment Asia 14(1) 2021 13-22
Synoptic analysis of dust storm in Iraq
...Show More Authors

In this study, the synoptic analysis of dust storm for spring and summertime in Iraq were investigated. The images for dust provided by NASA are used to emphasize the dust storm days, while the composite maps of wind vector and geopotential 850hPa are mapped to investigate the pressure and wind direction patterns appearing with the dust condition in the same days. Spring has more dust frequency than summertime, especially in May. The frontal type of dust storm is dominant on spring, the cold air pushes the warm air that picking up the sand to the air through the vertical wind, but the southwestern high-speed wind and drought condition were controlled on the dust in summer. The northwestern wind is the main factor that carries the dust for l

... Show More
Scopus (14)
Scopus
Publication Date
Tue Oct 05 2010
Journal Name
Journal Of College Of Education For Women
Conversation Analysis of Forum: a Selected Text from Paul S. Kemp Online Journal
...Show More Authors

Language as a means of communication has long been the concern of many conversation analysts in their studies such as: Sacks et al. (1974), Schegloff et al. (1977), Duncan (1972), Grice (1975) and Burton (1980). Burton has attempted analyzing the first ten transitions of the play “The Dumb Waiter” for mere a presentation of her approach. This paper aims at analyzing the conversational structure of forum on the subject of literary fiction and genre fiction by applying Burton’s model (1980) of analysis to answer the question to what extent this model is applicable in analyzing the presented text. The findings of the investigation have proved the applicability of the structure of conversation formulated by Burton (1980) in her model wit

... Show More
Preview PDF
Publication Date
Mon Dec 01 2014
Journal Name
2014 Ieee Symposium On Differential Evolution (sde)
Comparative analysis of a modified differential evolution algorithm based on bacterial mutation scheme
...Show More Authors

A new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref