Criticism is inherently impolite and a face-threatening act generally leading to conflicts among interlocutors. It is equally challenging for both native and non-native speakers, and needs pre-planning before performing it. The current research examines the production of non-institutional criticism by Iraqi EFL university learners and American native speakers. More specifically, it explores to what extent Iraqi EFL learners and American native speakers vary in (i) performing criticism, (ii) mitigating criticism, and (iii) their pragmatic choices according to the contextual variables of power and distance. To collect data, a discourse-completion task was used to elicit written data from 20 Iraqi EFL learners and 20 American native speakers. Findings revealed that though both groups regularly used all strategy types, Iraqi EFL learners criticized differently from American speakers. When expressing criticism, Iraqi learners tended to be indirect whereas American speakers tended to be direct. In mitigating their criticism, Iraqi learners were significantly different from American speakers in their use of internal and external modifiers. Furthermore, both groups substantially varied their pragmatic choices according to context. The differences in their pragmatic performance could be attributed to a number of interplaying factors such as EFL learners’ limited linguistic and pragmatic knowledge, the context of learning and L1 pragmatic transfer. Finally, a number of conclusions and pedagogical implications are presented.
In this paper two ranking functions are employed to treat the fuzzy multiple objective (FMO) programming model, then using two kinds of membership function, the first one is trapezoidal fuzzy (TF) ordinary membership function, the second one is trapezoidal fuzzy weighted membership function. When the objective function is fuzzy, then should transform and shrinkage the fuzzy model to traditional model, finally solving these models to know which one is better
In this study an experimental work was done to study the possibility of using aluminum rubbish material as a coagulant to remove the colloidal particles from oily wastewater by dissolving this rubbish in sodium hydroxide solution. The experiments were carried out on simulated oily wastewater that was prepared at different oil concentrations and hardness levels (50, 250, 500, and 1000) ppm oil for (2000, 2500, 3000, and 3500) ppm CaCo3 respectively. The initial turbidity values were (203, 290, 770, and 1306) NTU, while the minimum values of turbidity that have been gained from the experiments in NTU units were (1.67, 1.95, 2.10, and 4.01) at best sodium aluminate dosages in milliliters (12, 20, 24, and 28) for
... Show MoreGraph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
120 samples were collected from children (ages between new born and 10 years) who infected with oral thrush. The results revealed that the Minimum Inhibitory Concentration (MIC) and Minimum Fungicidal Concentration (MFC) of extracted oil of lemon grass against C.albicans, C.tropicalis, C.keyfr, C.glabrata and C.guilliermondii were 1.25,1.25,1.25,2.5 and 2.5µl/ml and 2.5, 2.5, 2.5, 5 and 5 µl /ml respectively. while the (MIC) and (MFC) for the extraction oil of thyme against C.albicans, C.tropicalis, C.keyfr, C.glabrata and C.guilliermondii were 0.6, 0.6, 1.25, 1.25, and 1.25µl/ml and 1.25, 1.25, 2.5, 2.5, and 2.5µl/ml respectively . While the value of (MIC) and (MFC) for Nystatin against Candida species were 32 and 64 µg
... Show MoreThe research includes the preparation of several complexes of the internal transition elements lanthanide (Ln = La, Nd, Er, Gd, and Dy) containing the 4f shell, with Schiff bases resulting from condensation reactions between 4-antipyrinecarboxaldehyde and 2-aminobenzothiazoles. Schiff's base was identified using FTIR spectra, UV-vis spectroscopy, elemental microanalysis CHNSO, nuclear magnetic resonance, mass spectrometry, and TGA thermal analysis. The complexes were studied and identified with elemental microanalysis CHNSO, FTIR spectroscopy, UV-vis spectroscopy, TGA thermal analysis, conductivity measurement, and magnetic sensitivity. The result showed that these complexes were classified as homogeneous bidentate complexes with th
... Show More