Lying is a controversial issue as it is closely related to one's intended meaning to achieve certain pragmatic functions. The use of lying in literary works is closely related to the characters’ pragmatic functions as in the case of Miller's The Crucible where it is used as a deceptive complex phenomenon that cannot be observed out of context. That is, the use of lying as a deceptive phenomenon represents a violation to Grices's Maxims. Thus, the study aims to qualitatively examine the kinds of maxims being violated, the kinds of violations conducted, the strategies followed in the violations, and the pragmatic functions behind such violations across the different categories of lies. To this end, the (30) extracts found in Miller's The Crucible have been all examined following Grice's (1975/1978) Cooperative Principle and Implicature theories. The analysis has revealed that the quality maxim was breached most of the time with a percentage of (96,6~97%), covert violation occupied (66,6~67%) (the same percentages of both prototypical lies and Intentional Deceptive Lies), fabrication was with (83%) and the pragmatic function ''to avoid punishment'' appears with (46,6~47%). This means that truthfulness was violated beside other maxims, and strategies of fabrication. Such a violation enhances lying, and false-implicature, and intensifies the tragic end for most of the innocent characters. Minor lies are slightly concerned with plot development and events escalation. Finally, the characters lie in order to achieve certain pragmatic functions. However, the most dominant function adopted when lying was to avoid punishment.
The calibration of a low-speed wind tunnel (LSWT) test section had been made in the present work. The tunnel was designed and constructed at the Aerodynamics Lab. in the Mechanical Engineering Department/University of Baghdad. The test section design speed is 70 m/s. Frictional loses and uniformity of the flow inside the test section had been tested and calibrated based on the British standards for flow inside ducts and conduits. Pitot-static tube, boundary layer Pitot tube were the main instruments which were used in the present work to measure the flow characteristics with emphasize on the velocity uniformity and boundary layer growth along the walls of the test section. It is found that the maximum calibrated velocity for empty test s
... Show MoreThe aim of the research is to identify the extent of the direct and indirect relationship of the population growth of the cities as a result of the urbanization process witnessed by the Arab region for the urban development of the city structures and their formative structures, changing the planning criteria of some cities and the extent of their changes in spatial and temporal dimensions and their relation to the standards of the western cities. In changing the concept of the modern Arab city, such as the emergence of new functional uses affecting the change in the pattern of formal formations of its urban fabric associated with its ancient morphology and distinctive human nature. The research seeks to identify the extent to which plann
... Show MoreAverage interstellar extinction curves for Galaxy and Large Magellanic Cloud (LMC) over the range of wavelengths (1100 A0 – 3200 A0) were obtained from observations via IUE satellite. The two extinctions of our galaxy and LMC are normalized to Av=0 and E (B-V)=1, to meat standard criteria. It is found that the differences between the two extinction curves appeared obviously at the middle and far ultraviolet regions due to the presence of different populations of small grains, which have very little contribution at longer wavelengths. Using new IUE-Reduction techniques lead to more accurate result.
The aerodynamic characteristics of general three-dimensional rectangular wings are considered using non-linear interaction between two-dimensional viscous-inviscid panel method and vortex ring method. The potential flow of a two-dimensional airfoil by the pioneering Hess & Smith method was used with viscous laminar, transition and turbulent boundary layer to solve flow about complex configuration of airfoils including stalling effect. Viterna method was used to extend the aerodynamic characteristics of the specified airfoil to high angles of attacks. A modified vortex ring method was used to find the circulation values along span wise direction of the wing and then interacted with sectional circulation obtained by Kutta-Joukowsky theorem of
... Show MoreMany approaches have been developed over time to counter the bioavailability limitations of poorly soluble drugs. With advances in nanotechnology in recent decades, this issue has been approached through the formulation of drugs as nanocrystals. Nanocrystals consist of pure drug(s) and a minimum of surface active agent(s) required for stabilization. They are carrier-free submicron colloidal drug delivery systems with a mean particle size typically in the range of 200 - 500 nm. By reducing particle size to nanoscale, the surface area available for dissolution is increased, and thus bioavailability is enhanced. Drug nanocrystals constitute a versatile formulation approach to enhance the pharmacokinetic and pharmacodynamic properties of poorly
... Show MoreIn this research the a-As flims have been prepared by thermal evaporation with thickness 250 nm and rata of deposition r_d(1.04nm/sec) as function to annealing temperature (373 and 473K), from XRD analysis we can see that the degree of crystalline increase with T_a, and I-V characteristic for dark and illumination shows that forward bias current varieties approximately exponentially with voltage bias. Also we found that the quality factor and saturation current dependence on annealing temperatures.
The growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show More