Lying is a controversial issue as it is closely related to one's intended meaning to achieve certain pragmatic functions. The use of lying in literary works is closely related to the characters’ pragmatic functions as in the case of Miller's The Crucible where it is used as a deceptive complex phenomenon that cannot be observed out of context. That is, the use of lying as a deceptive phenomenon represents a violation to Grices's Maxims. Thus, the study aims to qualitatively examine the kinds of maxims being violated, the kinds of violations conducted, the strategies followed in the violations, and the pragmatic functions behind such violations across the different categories of lies. To this end, the (30) extracts found in Miller's The Crucible have been all examined following Grice's (1975/1978) Cooperative Principle and Implicature theories. The analysis has revealed that the quality maxim was breached most of the time with a percentage of (96,6~97%), covert violation occupied (66,6~67%) (the same percentages of both prototypical lies and Intentional Deceptive Lies), fabrication was with (83%) and the pragmatic function ''to avoid punishment'' appears with (46,6~47%). This means that truthfulness was violated beside other maxims, and strategies of fabrication. Such a violation enhances lying, and false-implicature, and intensifies the tragic end for most of the innocent characters. Minor lies are slightly concerned with plot development and events escalation. Finally, the characters lie in order to achieve certain pragmatic functions. However, the most dominant function adopted when lying was to avoid punishment.
استخلص عامل التلزن من E. faecalis EM1 بعد تكسير الخلايا بعدة طرق واختيار الطريقة التي تعطي اعلى قيمة تلزن والترسيب بالكحول الاثيلي , واجري فحص التلزن وقياسه للمستخلص مع انواع من البكتريا السالبة لملون غرام تضمنت Escherichia coli و Klebsiella pneumoniae و Serratia
In this manuscript, the effect of substituting strontium with barium on the structural properties of Tl0.8Ni0.2Sr2-xBrxCa2Cu3O9-δcompound with x= 0, 0.2, 0.4, have been studied. Samples were prepared using solid state reaction technique, suitable oxides alternatives of Pb2O3, CaO, BaO and CuO with 99.99% purity as raw materials and then mixed. They were prepared in the form of discs with a diameter of 1.5 cm and a thickness of (0.2-0.3) cm under pressures 7 tons / cm2, and the samples were sintered at a constant temperature o
... Show MoreMost companies use social media data for business. Sentiment analysis automatically gathers analyses and summarizes this type of data. Managing unstructured social media data is difficult. Noisy data is a challenge to sentiment analysis. Since over 50% of the sentiment analysis process is data pre-processing, processing big social media data is challenging too. If pre-processing is carried out correctly, data accuracy may improve. Also, sentiment analysis workflow is highly dependent. Because no pre-processing technique works well in all situations or with all data sources, choosing the most important ones is crucial. Prioritization is an excellent technique for choosing the most important ones. As one of many Multi-Criteria Decision Mak
... Show Moreمشكلة البحث The Problem of the Research
يعّد التحصيل الدراسي للطلبة عموما من أهم أركان النشاط العقلي في المجال التربوي، فلا تكاد تخلو منه أيه مدرسة، أبتداءً من المدارس الابتدائية وقد تسبقها رياض الأطفال، إلى المدرسة الإعدادية والجامعية ، وقد تمتد إلى مراحل متقدمة في العمر، فكان الطالب وما يزال هو محور العملية ال
... Show MoreIn modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using
... Show Moreتنفذ أجهزة اإلحصاء الدولية ومنها الجهاز المركزي لإلحصاء في العراقإحدى أجهزة وزارة التخطيط، تقوم بإجراء مسوح سنوية ودورية لإنتاج مؤشرات تقييم وتقويم أنشطة القطاعات الاقتصادية المختلفة. يتيح هذا الكم الهائل من البيانات بشكل سلسل زمني لهذه الأجهزة إنتاج مؤشرات جديدة، بما في ذلك القيم التنبؤية لمؤشرات رئيسية تستخدم في إعداد الخطط طويلة وقصيرة المدى. في عام 2015، قامت مديرية الإحصاء الزراعي في الجهاز المركزي للإ
... Show Moreمن خلال ملاحظة الباحثتين الميدانية لمستوى الأداء الفني لمنتخب ناشئات القطر بالجمناستك لمهارة قفزة اليدين الأمامية على جهاز منصة القفز الحديثة لاحظن وجود مشكلة تكمن في ضعف هذا الأداء والذي يؤثر على بعض المتغيرات البيوكينماتيكية لهذه المهارة مما يؤدي إلى عدم أداء المهارة بالشكل الصحيح ، وتعزو الباحثتان ذلك الضعف إلى قلة الدفع بالرجلين والذراعين . لذا ارتأت الباحثتان إجراء هذا البحث الذي يهدف إلى تنمية القوة
... Show More