Preferred Language
Articles
/
jcolang-106
A Pragmatic Study of English Honorific Forms
...Show More Authors

         It is axiomatic that languages mirror  the world view of their users. Manipulating honorific forms  among people inevitably reflects this truth . Honorifics are conventionalized forms or expressions  manifested in all the world's languages and  are used to  express the social status of the participants in the verbal interaction and to convey indications like politeness and respect  . English is no exception. However the question is what exactly creates these forms and their meanings. Although  honorifics have been extensively researched from a grammatical and semantic  angle  , yet they haven’t received that significant  attention  in pragmatic research, especially their use in literary works .Thus, this qualitative paper aims at clarifying the main linguistic devices that represent English honorific forms  and investigating the main functions and the pragmatic meanings that these forms can express. Based on eight extracts  taken from George Bernard Shaw's play "Caesar and Cleopatra  , the present study examines the use of honorific forms   with much focus on the pragmatic strategies deployed in creating their meaning . The findings of the study reveals that context is the most important and effective factor in creating, using, and interpreting honorifics.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 01 2016
Journal Name
Radiology Case Reports
Intralobar pulmonary sequestration in elderly woman: a rare case report with emphasis on imaging findings
...Show More Authors

View Publication
Scopus (8)
Crossref (10)
Scopus Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Sensors
WDARS: A Weighted Data Aggregation Routing Strategy with Minimum Link Cost in Event-Driven WSNs
...Show More Authors

Realizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost

... Show More
View Publication Preview PDF
Scopus (36)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Journal Of Engineering
Production Load–bearing Concrete Masonry Units by Using Recycled Waste Crushed Clay Bricks; A Review
...Show More Authors

There are serious environmental problems in all countries of the world, due to the waste material such as crushed clay bricks (CCB) and in huge quantities resulting from the demolition of buildings. In order to reduce the effects of this problem as well as to preserve natural resources, it is possible to work on recycling (CCB) and to use it in the manufacture of environmentally friendly loaded building units by replacing percentages in coarse aggregate by volume. It can be used as a powder and replacing of percentages in cement by weight and study the effect on the physical and mechanical properties of the concrete and the masonry unit. Evaluation of its performance through workability, dry density, compressive strength, thermal conduct

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Sep 03 2017
Journal Name
Baghdad Science Journal
Gravity Field Interpretation for Major Fault Depth Detection in a Region Located SW- Qa’im / Iraq
...Show More Authors

This research deals with the qualitative and quantitative interpretation of Bouguer gravity anomaly data for a region located to the SW of Qa’im City within Anbar province by using 2D- mapping methods. The gravity residual field obtained graphically by subtracting the Regional Gravity values from the values of the total Bouguer anomaly. The residual gravity field processed in order to reduce noise by applying the gradient operator and 1st directional derivatives filtering. This was helpful in assigning the locations of sudden variation in Gravity values. Such variations may be produced by subsurface faults, fractures, cavities or subsurface facies lateral variations limits. A major fault was predicted to extend with the direction NE-

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
A Novel Approach to Improving Brain Image Classification Using Mutual Information-Accelerated Singular Value Decomposition
...Show More Authors

View Publication
Scopus (45)
Crossref (42)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Sustainable Materials And Technologies
A sustainable pavement concrete using warm mix asphalt and hydrated lime treated recycled concrete aggregates
...Show More Authors

Recently, increasing material prices coupled with more acute environmental awareness and the implementation of regulation has driven a strong movement toward the adoption of sustainable construction technology. In the pavement industry, using low temperature asphalt mixes and recycled concrete aggregate are viewed as effective engineering solutions to address the challenges posed by climate change and sustainable development. However, to date, no research has investigated these two factors simultaneously for pavement material. This paper reports on initial work which attempts to address this shortcoming. At first, a novel treatment method is used to improve the quality of recycled concrete coarse aggregates. Thereafter, the treated recycled

... Show More
View Publication
Crossref (28)
Crossref
Publication Date
Thu Jun 26 2014
Journal Name
Engineering Optimization
A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising
...Show More Authors

The main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. As the standard DE algorithm is a fixed length optimizer, it is not suitable for solving signal de-noising problems that call for variability. A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. The measurement results demonstrate a highly efficient capability for target detection in terms of frequency response and peak forming that was isola

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Dec 23 2020
Journal Name
Iraqi Journal For Electrical And Electronic Engineering
Heuristic and Meta-Heuristic Optimization Models for Task Scheduling in Cloud-Fog Systems: A Review
...Show More Authors

Nowadays, cloud computing has attracted the attention of large companies due to its high potential, flexibility, and profitability in providing multi-sources of hardware and software to serve the connected users. Given the scale of modern data centers and the dynamic nature of their resource provisioning, we need effective scheduling techniques to manage these resources while satisfying both the cloud providers and cloud users goals. Task scheduling in cloud computing is considered as NP-hard problem which cannot be easily solved by classical optimization methods. Thus, both heuristic and meta-heuristic techniques have been utilized to provide optimal or near-optimal solutions within an acceptable time frame for such problems. In th

... Show More
View Publication
Crossref (12)
Crossref