Preferred Language
Articles
/
jcoeduw-1522
Lying in Arthur Miller's The Crucible: A Pragmatic Study: هديل محمود إبراهيم , جمعه قادر حسين
...Show More Authors

Lying is a controversial issue as it is closely related to one's intended meaning to achieve certain pragmatic functions. The use of lying in literary works is closely related to the characters’ pragmatic functions as in the case of Miller's The Crucible where it is used as a deceptive complex phenomenon that cannot be observed out of context. That is, the use of lying as a deceptive phenomenon represents a violation to Grices's Maxims. Thus, the study aims to qualitatively examine the kinds of maxims being violated, the kinds of violations conducted, the strategies followed in the violations, and the pragmatic functions behind such violations across the different categories of lies. To this end, the (30) extracts found in Miller's The Crucible have been all examined following Grice's (1975/1978) Cooperative Principle and Implicature theories. The analysis has revealed that the quality maxim was breached most of the time with a percentage of (96,6~97%), covert violation occupied (66,6~67%) (the same percentages of both prototypical lies and Intentional Deceptive Lies), fabrication was with (83%) and the pragmatic function ''to avoid punishment'' appears with (46,6~47%). This means that truthfulness was violated beside other maxims, and strategies of  fabrication. Such a violation enhances lying, and false-implicature, and intensifies the tragic end for most of the innocent characters. Minor lies are slightly concerned with plot development and events escalation. Finally, the characters lie in order to achieve certain pragmatic functions. However, the most dominant function adopted when lying was to avoid punishment.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 15 2022
Journal Name
Journal Of Sensors
A Modern Approach towards an Industry 4.0 Model: From Driving Technologies to Management
...Show More Authors

Every so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph

... Show More
View Publication
Scopus (101)
Crossref (89)
Scopus Clarivate Crossref
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Schema Theory and Text- worlds: A Cognitive Stylistic Analysis of Selected Literary Texts
...Show More Authors

Cognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections.       

Schema and text world theories are useful tools in cognitive stylistic stud

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Mon Jul 01 2019
Journal Name
International Journal Of Heat And Mass Transfer
Hybrid heat transfer enhancement for latent-heat thermal energy storage systems: A review
...Show More Authors

View Publication
Scopus (282)
Crossref (288)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Evaluation of Anxiety and Depression among a Sample of Hypothyroidism-Treated Iraqi Patients
...Show More Authors

Background: Hypothyroidism is the most prevalent thyroid disorders worldwide.  Hypothyroidism manifestations are wide spectrum, affecting various systems in human body including the nervous system. Hypothyroidism can cause neuropsychiatric symptoms such as anxiety, depression and diminishing in attention, memory and executive function. Aim: to investigate the level of anxiety and depression in patients with hypothyroidism receiving levothyroxine treatment. Method: a cross-sectional study was conducted at Baghdad Center for Nuclear Medicine and Radiation Therapy from March to June 2022. The study population included patients of both genders, aged 18-65 years, diagnosed with hypothyroidism, were receiving levothyroxine treatment and

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Tue Feb 24 2015
Journal Name
Robotica
Multi-level control of zero-moment point-based humanoid biped robots: a review
...Show More Authors
SUMMARY<p>Researchers dream of developing autonomous humanoid robots which behave/walk like a human being. Biped robots, although complex, have the greatest potential for use in human-centred environments such as the home or office. Studying biped robots is also important for understanding human locomotion and improving control strategies for prosthetic and orthotic limbs. Control systems of humans walking in cluttered environments are complex, however, and may involve multiple local controllers and commands from the cerebellum. Although biped robots have been of interest over the last four decades, no unified stability/balance criterion adopted for stabilization of miscellaneous walking/running modes of biped </p> ... Show More
View Publication
Scopus (37)
Crossref (37)
Scopus Clarivate Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Study electron transport coefficients for Ar, O<sub>2</sub> and their mixtures by using EEDF program
...Show More Authors

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
Study of some structural , optical , Electrical Properties of CdS thin films deposited by chemical Spray Pyrolysis Method
...Show More Authors

In this research we prepared CdS thin films by Spray pyrolysis method on a glass substrates and we study its structural , optical , electrical properties .The result of (X-Ray ) diffraction showed that all thin films have a polycrystalline structure , The relation of the transmission as a function of wavelength for the CdS films had been studied , The investigated of direct energy gap of the CdS its value is (2.83 eV). In Hall effect measurement of the CdS we find the charge carriers is p – type and Hall coefficient 1157.33(cm3/c) ,Hall mobility 6.77(cm2/v.s)

View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Numerical Study of Optimum Configuration of Unconventional Airfoil with Steps and Rotating Cylinder for Best Aerodynamics Performance
...Show More Authors

Numerical study of separation control on symmetrical airfoil, four digits (NACA

0012) by using rotating cylinder with double steps on its upper surface based on the computation of Reynolds-average Navier- Stokes equations was carried out to find the optimum configuration of unconventional airfoil for best aerodynamics performance. A model based on collocated Finite Volume Method was developed to solve the governing equations on a body-fitted coordinate system. A revised (k-w) model was proposed as a known turbulence model. This model was adapted to simulate the control effects of rotating cylinder. Numerical solutions were performed for flow around unconventional airfoil with cylinder to main stream velocities ratio in the range

... Show More
View Publication Preview PDF
Crossref