Preferred Language
Articles
/
jcoeduw-1522
Lying in Arthur Miller's The Crucible: A Pragmatic Study: هديل محمود إبراهيم , جمعه قادر حسين
...Show More Authors

Lying is a controversial issue as it is closely related to one's intended meaning to achieve certain pragmatic functions. The use of lying in literary works is closely related to the characters’ pragmatic functions as in the case of Miller's The Crucible where it is used as a deceptive complex phenomenon that cannot be observed out of context. That is, the use of lying as a deceptive phenomenon represents a violation to Grices's Maxims. Thus, the study aims to qualitatively examine the kinds of maxims being violated, the kinds of violations conducted, the strategies followed in the violations, and the pragmatic functions behind such violations across the different categories of lies. To this end, the (30) extracts found in Miller's The Crucible have been all examined following Grice's (1975/1978) Cooperative Principle and Implicature theories. The analysis has revealed that the quality maxim was breached most of the time with a percentage of (96,6~97%), covert violation occupied (66,6~67%) (the same percentages of both prototypical lies and Intentional Deceptive Lies), fabrication was with (83%) and the pragmatic function ''to avoid punishment'' appears with (46,6~47%). This means that truthfulness was violated beside other maxims, and strategies of  fabrication. Such a violation enhances lying, and false-implicature, and intensifies the tragic end for most of the innocent characters. Minor lies are slightly concerned with plot development and events escalation. Finally, the characters lie in order to achieve certain pragmatic functions. However, the most dominant function adopted when lying was to avoid punishment.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Engineering
Adding Cellulosic Ash to Composting Mix as a Soil Amendment
...Show More Authors

Solid waste generation and composition in Baghdad is typically affected by population growth, urbanization, improved economic conditions, changes in lifestyles and social and cultural habits.

A burning chamber was installed to burn cellulosic waste only. It was found that combustion reduced the original volume and weight of cellulosic waste by 97.4% and 85% respectively.

A batch composting study was performed to evaluate the feasibility of co-composting organic food waste with the cellulosic bottom ash in three different weight ratios (w/w) [95/5, 75/25, 50/50].

The composters were kept in controlled aerobic conditions for 7 days. Temperature, moisture, and pH were measured hourly as process succe

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Al-nahrain University Science
Antimicrobial Activity of a Bioemulsifier Produced by Serratia marcescens S10
...Show More Authors

This study was designed to evaluate the ability of bioemulsifier to inhibit the growth of some pathogenic microorganisms. Fourteen isolates belonged to Serratia sp. were collected and tested for their ability to produce bioemulsifier. Results showed that Serratia marcescens S10 (isolated from the gut of the American cockroach) had the highest ability to produce bioemulsifier, among 14 isolates belong to Serratia spp. and it had the ability to inhibit the growth of some microorganisms. The production of bioemulsifier was detected by determination of emulsification index (E24%), qualitative drop-collapse test, emulsification activity (E.A) and measuring the surface tension (S.T). The results of bioemulsifier produced by Serratia marcescens S1

... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Al-kindy College Medical Journal
SARS-CoV-2 and other Coronaviruses: A matter of variations
...Show More Authors

Since the appearance of COVID-19 disease as an epidemic and pandemic disease, many studies are performed to uncover the genetic nature of the newly discovered coronavirus with unique clinical features. The last three human coronavirus outbreaks, SARS-CoV, MERS-CoV and SARS-CoV-2 are caused by Beta-Coronaviruses. Horizontal genetic materials transfer was proven from one coronavirus to the other coronavirus of non-human origin like infectious bronchitis virus (IBV) of avian. Horizontal genetic materials transfer was also from non-corona viruses like astroviruses and equine rhinovirus (ERV-2) or from coronavirus-unrelated viruses, like influenza virus type C. However, SARS-CoV-2 is identical to SARS-CoV and MERS-CoV. Interestingly, Wuhan ci

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Crossref
Publication Date
Wed Oct 01 2014
Journal Name
2014 44th European Microwave Conference
A low magnetic bias sub-millimetre wave semiconductor junction circulator
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Feb 20 2024
Journal Name
Baghdad Science Journal
A New Strategy to Modify Hopfield by Using XOR Operation
...Show More Authors

The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Asian Journal Of Pharmacy And Pharmacology
Genetic polymorphisms associated with diabetic foot ulcer: A review article
...Show More Authors

Diabetic foot ulcer (DFU) or Lower limb ulcers are one of the major complications caused by diabetes mellitus especially when patients fail to maintain tight glycemic control. DFU is linked to multiple risk factors along with the genetic factors and ethnicity which play a significant role in the development of DFUs through their effects on multiple aspects of the pathophysiological process. This narrative review aimed to summarize all the previous studies within the last ten years associating gene polymorphism and DFU. Polymorphism associated with vascular endothelial growth factor (rs699947), the G894T polymorphism of the endothelial nitric oxide synthase gene, interleukin-6–174 G>C gene polymorphism, heat shock protein 70 gene polymorph

... Show More
Preview PDF
Crossref (4)
Crossref
Publication Date
Fri Jun 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
Revitalization of a necrotic immature permanent anterior tooth (Case Report)
...Show More Authors

Background: Management of immature permanent teeth with necrotic pulp is considered challenging to the clinician. Regeneration of pulp tissue is a relatively new approach for management of these teeth that allow continuation of root maturation rather than formation of just a calcific barrier as in apexification. Method: 9 years-old girl with traumatized upper left central incisor. The clinical and radiographical examinations revealed uncomplicated crown fracture, tenderness to percussion, absence of response to cold vitality test. Diagnostic X-ray revealed open apex with periapical radiolucency. Revascularization was suggested to treat the tooth, starting with irrigation of canal with 5% NaOCl + 3% H2O2, followed by 2 weeks of triple antibi

... Show More
View Publication
Crossref
Publication Date
Wed Oct 01 2025
Journal Name
Ieee
Securing Power Microgrids: A Cyber-Physical Approach for Modern Infrastructure
...Show More Authors

With the increasing reliance on microgrids as flexible and sustainable solutions for energy distribution, securing decentralized electricity grids requires robust cybersecurity strategies tailored to microgrid-specific vulnerabilities. The research paper focuses on enhancing detection capabilities and response times in the face of coordinated cyber threats in microgrid systems by implementing advanced technologies, thereby supporting decentralized operations while maintaining robust system performance in the presence of attacks. It utilizes advanced power engineering techniques to strengthen cybersecurity in modern power grids. A real-world CPS testbed was utilized to simulate the smart grid environment and analyze the impact of cyberattack

... Show More