With the advancement of technology ,the study of cross-cultural communication via on line has become an important and researchable topic in linguistic theory and its applications.The aims of this study are two- fold (a) exploring the influence of cultural diversity on on-line interaction between American native speakers (NSs) and Iraqi non-native speakers (NNSs) of English which, together with other factors might potentially lead to what Thomas(1983) calls "pragmatic failure" (PF), a main cause of communication breakdowns and (b) specifying which type of PF occurs more frequently between the two groups along with the reasons behind such failures. To achieve these objectives , a number of online chats conducted between (10) American speakers of English and (8) Iraqi graduate students of English were collected and analyzed on the basis of Thomas' (1983) division of PF in an attempt to verify the assumption that pragmatic failure is a result of cultural diversity between the two groups of participants.Results revealed that the cultural differences between the two groups could be a major cause of misunderstanding ie. PF., a finding which can be of value to textbook designers and teachers of English as a foreign language (FL)who are required to improve students' pragmatic ability in classroom by focusing not only on their grammatical competence but also on their pragmatic competence.
This research examines the phonological adaptation of pure vowels in English loanwords in Iraqi Arabic (IA). Unlike previous small-scale studies, the present study collected 346 loanwords through document review and self-observation, and then analyzed them using quantitative content analysis to identify the patterns of pure vowel adaptation involved in incorporating English loanwords into IA. The content analysis findings showed that most pure vowel adaptations in English loanwords in IA follow systematic patterns and may thus be attributed to specific characteristics of both L1 and L2 phonological systems. Specifically, the findings suggest that the IA output forms typically preserve the features of the input pure vowel to the maxi
... Show MoreThere is no adopt in the importance of the optical communications in scientific civil and military applications because of it’s simplicity in manufacturing and it's low cost. The method of optical communication depends upon bearing the light beam the translated informations by a method called the light modulation. This method depends upon changing some light properties as frequency, amplitude and pulse duration according to the translating informations. The changes in the first two properties are concerned optically with the analog modulation while the third one concern at most with digital modulation. All past methods are expensive with low efficiency and needs electrical or magnetic fields. In this technique the source of voice used
... Show MoreWitch stories are part of American popular culture, and this culture is extremely influenced by a continuing reliance on its past. The modern obsession of Americans with witches, whether real or metaphorical, is related to politics especially when it came to issues of gender politics. This article exposes a modern image of the female character seen from a male author point of view. John Updike, influenced by the changes that happened to women within second wave of feminism, attempted to write The Witches of Eastwick (1984). Actually, he presented women who did have a sort of careers. His witches are professional active and dynamic. What do witches stand for in American Culture? Why did Updike choose to write
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreTo maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of
... Show More