Lying is a controversial issue as it is closely related to one's intended meaning to achieve certain pragmatic functions. The use of lying in literary works is closely related to the characters’ pragmatic functions as in the case of Miller's The Crucible where it is used as a deceptive complex phenomenon that cannot be observed out of context. That is, the use of lying as a deceptive phenomenon represents a violation to Grices's Maxims. Thus, the study aims to qualitatively examine the kinds of maxims being violated, the kinds of violations conducted, the strategies followed in the violations, and the pragmatic functions behind such violations across the different categories of lies. To this end, the (30) extracts found in Miller's The Crucible have been all examined following Grice's (1975/1978) Cooperative Principle and Implicature theories. The analysis has revealed that the quality maxim was breached most of the time with a percentage of (96,6~97%), covert violation occupied (66,6~67%) (the same percentages of both prototypical lies and Intentional Deceptive Lies), fabrication was with (83%) and the pragmatic function ''to avoid punishment'' appears with (46,6~47%). This means that truthfulness was violated beside other maxims, and strategies of fabrication. Such a violation enhances lying, and false-implicature, and intensifies the tragic end for most of the innocent characters. Minor lies are slightly concerned with plot development and events escalation. Finally, the characters lie in order to achieve certain pragmatic functions. However, the most dominant function adopted when lying was to avoid punishment.
Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreThis article discusses some of the metaphorical use of language units. Here we will define the basic concepts and underline the causes of this phenomenon. Through research it is proven that through the application of names of some body parts achieves the variety of metaphorical meanings.
The majority of Arab EFL (English as a Foreign Language) learners struggle with speaking English fluency. Iraqi students struggle to speak English confidently due to mispronunciation, grammatical errors, short and long pauses while speaking or feeling confused in normal conversations. Collaborative learning is crucial to enhance student’s speaking skills in the long run. This study aims to state the importance of collaborative learning as a teaching method to EFL learners in the meantime. In this quantitative and qualitative study, specific focus is taken on some of Barros’s views of collaborative learning as a teamwork and some of Pattanpichet’s speaking achievements under four categories: academic benefits, social benefits,
... Show MoreAlthough severe epistaxis is uncommon, it is serious. The systematic endoscopic nasal examination is an essential step in identifying the bleeding point and aiding electrocauterization. Currently, the S-point, which is located in the superior part of the nasal septum behind the septal body and corresponding to the axilla of the middle concha, is identified in about 30% of cases with severe epistaxis. Cauterization of this point has an excellent rate of controlling the bleeding and preventing its recurrence. We aimed to highlight the significance of the S-point in the management of severe cases of epistaxis.
لقد انبثقت رؤيا حديثة في مسرح الثمانينات من القرن العشرين كان هدفها دحر حس الاسر الذي عاشه انسان العصر الحديث وفي محاولة للارتقاء بارادته وحرية الاختيار نحو الانعتاق من محاولات المصادرة الفظة لها. وبالرغم من افتراض هذه الرؤيا انها ذات طابع سلبي, الا ان رؤيا الانتحار قدعدت بانها قادرة على ان تجعل في متناول يد الانسان احساسا طموحا بالتحكم على الاقل بنوع النهاية التي يكتبها لحياته. وقد انعكست هذة الرؤيا ال
... Show MoreDestiny functional theory (DFT) calculations are undertaken in order to scrutinize the electrochemical and calcium (Ca) storage characteristics of a graphyne-like aluminum nitride monolayer (G-AlNyen) as an electrode material for Ca-ion batteries (CIBs). The results show that the change in internal energy as well as the cell voltage values for the CIB with the G-AlNyen anode are comparable to others with two-dimensional 2D nano-materials. It is shown that Ca is adsorbed primarily onto the center of a hexagonal and triangular ring of G-AlNyen with absorption energies of −2.06 and −0.42 eV. After increasing the concentration of Ca atoms on G-AlNyen, the adsorption energy as well as the cell voltage decreases. Lower values of 0.15–0.32 e
... Show MoreThe Lamiaceae L. family grows and widely distributed in Iraq. The study aimed to enumerate the species that has been preserved in several botanical herbariums: National Herbarium of Iraq- Ministry of Agriculture (BAG), University of Baghdad Herbarium (BUH), Iraq Natural History Research Center& Museum- University of Baghdad Herbarium (BUNH), College of Agricultural Engineering- University of Baghdad Herbarium (BUG), College of Agricultural Engineering Sciences- Duhok Province University Herbarium (DPUH) and College of Science - Salahddin University Herbarium (SUH). This family has not yet been registered in the Flora of Iraq. After examining more than 1000 herbarium specimens, the study found 139 species belonging to 33 genera h
... Show MoreThis research aims at identifying the Iraqi EFL students' academic buoyancy in reading and listening skills and then finding out the difference between the two skills; Furthermore, finding out the five predictors differences of each of the two scales. Two academic buoyancy scales used to collect data. After achieving the scales' psychometric characteristics, they are submitted to the study sample. The sample of (100) female students selected according to the stratified random method from the second class at the Department of English\ College of Education for Women\ University of Baghdad. The results show that the students have academic reading buoyancy and have not academic listening buoyancy; the difference between the two abilities shows
... Show MoreThis research aims to clarify the principles governing the exploration and utilization of outer space, emphasizing the role of international law, particularly international criminal law, in addressing crimes committed beyond Earth whether aboard spacecraft, the International Space Station, or in outer space generally. It examines relevant international treaties governing outer space activities, evaluates their strengths and ambiguities, and highlights deficiencies in their provisions. Furthermore, the study analyzes traditional principles of state criminal jurisdiction territoriality, nationality, universality, and protection and assesses their applicability to offenses committed in outer space.