Preferred Language
Articles
/
jcoeduw-1521
Classism Hate Speech in Katherine Mansfield's Short Story ‘The Doll’s House’: A Pragmatic Study: ايمان نوري جاسم , مصلح شويش احمد
...Show More Authors

Hate speech (henceforth HS) has recently spread and become an important issue. This type of speech in children's writings has a particular formulation and specific objectives that the authors intend to convey. Thus, the study aims at examining qualitatively and quantitatively the classism HS and its pragmatic functions via identifying the speech acts used to express  classism HS, the implicature instigated as well as impoliteness. Since pragmatics is the study of language in context, which is greatly related to the situations and speaker’s intention, this study depends on pragmatic theoriespeech acts, impoliteness and conversational implicature) to analyze the data which are taken from Katherine Mansfield's short story (The Doll’s House). The data has been analyzed qualitatively and quantitatively. It is qualitative, as it is dedicated to describe HS phenomenon that is found in the selected short story, depending on an eclectic model. Regarding the quantitative analysis, the researchers have used SPSS 23 program to determine the frequencies and percentages of the strategies that are intended to be measured. The study has concluded that HS has multiple dimensions that are difficult to interpret outside the context of speech. It can be conveyed by many strategies, both explicit and covert. Further, the simplest  form of HS involves an insult in addition to other functions, such as disapproval and humiliation. 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Mon Apr 26 2021
Journal Name
Journal Of Electrical Engineering & Technology
ANFIS Based Reinforcement Learning Strategy for Control A Nonlinear Coupled Tanks System
...Show More Authors

View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Synthesis and Characterization of Ni2O3 as a Phase of Nickel Oxide Nanomaterial
...Show More Authors

    Ni2O3 nanomaterial, a phase of nickel oxide, is synthesized by a simple chemical process. The pure raw materials used in the present process were nickel chloride hexahydrate NiCl2.6H2O and potassium hydroxide KOH by utilizing temperature at 250 oC for 2 hour.  The structural, morphological and optical properties of the synthesized specimens of Ni2O3 were investigated employing diverse techniques such as XRD, AFM, SEM and UV-Vis, respectively. The XRD technique confirms the presence of Ni2O3 nanomaterial with crystal size of 57.083 nm which indexing to the (2θ) of 31.82; this results revealed the Ni2O3 was a phase of nickel oxide with Nano structure. The synthesized Ni2O3 will be useful in manufacturng electrodes materials f

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sun Mar 06 2022
Journal Name
Cogent Arts &humanities
A corpus-based stylistic analysis of online suicide notes retrieved from Reddit
...Show More Authors

.

View Publication
Scopus (9)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Mon Sep 09 2013
Journal Name
Plant Biology
Comparing simple root phenotyping methods on a core set of rice genotypes
...Show More Authors
Abstract<p>Interest in belowground plant growth is increasing, especially in relation to arguments that shallow‐rooted cultivars are efficient at exploiting soil phosphorus while deep‐rooted ones will access water at depth. However, methods for assessing roots in large numbers of plants are diverse and direct comparisons of methods are rare. Three methods for measuring root growth traits were evaluated for utility in discriminating rice cultivars: soil‐filled rhizotrons, hydroponics and soil‐filled pots whose bottom was sealed with a non‐woven fabric (a potential method for assessing root penetration ability). A set of 38 rice genotypes including the Oryza<styled-content style="fixed-case">SNP</styled-content></p> ... Show More
View Publication
Scopus (33)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
'I-V Characteristic and Crystal Structural Of a-As/c-Si Heterojunctions
...Show More Authors

In this research the a-As flims have been prepared by thermal evaporation with thickness 250 nm and rata of deposition r_d(1.04nm/sec) as function to annealing temperature (373 and 473K), from XRD analysis we can see that the degree of crystalline increase with T_a, and I-V characteristic for dark and illumination shows that forward bias current varieties approximately exponentially with voltage bias. Also we found that the quality factor and saturation current dependence on annealing temperatures.

View Publication Preview PDF
Crossref
Publication Date
Mon Apr 02 2018
Journal Name
Al-nahrain Journal For Engineering Sciences (njes)
Output Feedback Adaptive Sliding Mode Control Design for a Plate Heat Exchanger
...Show More Authors

The heat exchanger is a device used to transfer heat energy between two fluids, hot and cold. In this work, an output feedback adaptive sliding mode controller is designed to control the temperature of the outlet cold water for plate heat exchanger. The measurement of the outlet cold temperature is the only information required. Hence, a sliding mode differentiator was designed to estimate the time derivative of outlet hot water temperature, which it is needed for constructing a sliding variable. The discontinuous gain value of the sliding mode controller is adapted according to a certain adaptation law. Two constraints which imposed on the volumetric flow rate of outlet cold (control input) were considered within the rules of the proposed

... Show More
Preview PDF
Publication Date
Sun Jun 02 2019
Journal Name
Baghdad Science Journal
Fog Computing Resource Optimization: A Review on Current Scenarios and Resource Management
...Show More Authors

            The unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Mar 04 2014
Journal Name
International Journal Of Advanced Computing
User Authentication Approach using a Combination of Unigraph and Digraph Keystroke Features
...Show More Authors

In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i

... Show More
Publication Date
Mon Sep 23 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Buckling analysis of reinforced composite plates with a multiwall carbon nanotube (MWCNT)
...Show More Authors

View Publication
Scopus (6)
Scopus Crossref