Aggression is a negative form of an anti-social behavior. It is produced because of a particular reason, desire, want, need, or due to the psychological state of the aggressor. It injures others physically or psychologically. Aggressive behaviors in human interactions cause discomfort and disharmony among interlocutors. The paper aims to identify how aggressive language manifests itself in the data under scrutiny in terms of the pragmatic paradigm. Two British literary works are the data; namely, Look Back in Anger by John Osborne (1956), and The Birthday Party by Harold Pinter (1957). This paper endeavors to answer the question of how aggressive language is represented in literature pragmatically? It is hoped to be significant to linguistic and psychological studies in that it clarifies how aggression is displayed in human communications linguistically. Qualitative and quantitative analyses are conducted to verify the findings. It ends with some concluding remarks, the most important of which are: insulting, belittling, ridiculing and threatening are prevalent speech acts; simile, hyperbole, metaphor and repetition appear due to Grice’s maxims breaching while the use of taboo words, calling names, or abusive words are the impoliteness strategies that are distinguished in the data.
Artificial intelligence techniques are reaching us in several forms, some of which are useful but can be exploited in a way that harms us. One of these forms is called deepfakes. Deepfakes is used to completely modify video (or image) content to display something that was not in it originally. The danger of deepfake technology impact on society through the loss of confidence in everything is published. Therefore, in this paper, we focus on deepfakedetection technology from the view of two concepts which are deep learning and forensic tools. The purpose of this survey is to give the reader a deeper overview of i) the environment of deepfake creation and detection, ii) how deep learning and forensic tools contributed to the detection
... Show MoreBuffering of Local anaesthesia (LA) has been suggested as a mechanism to improve injection comfort and hasten the onset of anaesthesia. Aim This study aimed to evaluate the effectiveness of buffered LA in the extraction of maxillary premolars and molars. Materials and Methods This randomized controlled study included 100 patients who were indicated for extraction of maxillary posterior teeth, they were randomly divided into two groups; a study group that received infiltration of buffered 2% lidocaine hydrochloride with 1:80,000 epinephrine LA, and a control group that received non-buffered 2% lidocaine hydrochloride with 1:80,000 epinephrine LA. The buffering was performed using the Onset® LA buffering system (Onpharma®). The outcome va
... Show MoreRenewable energy resources have become a promissory alternative to overcome the problems related to atmospheric pollution and limited sources of fossil fuel energy. The technologies in the field of renewable energy are used also to improve the ventilation and cooling in buildings by using the solar chimney and heat exchanger. This study addresses the design, construction and testing of a cooling system by using the above two techniques. The aim was to study the effects of weather conditions on the efficiency of this system which was installed in Baghdad for April and May 2020. The common weather in these months is hot in Baghdad. The test room of the design which has a size of 1 m3 was situated to face the geographical south. The te
... Show MoreDigital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou
... Show MoreThe advancement of digital technology has increased the deployment of wireless sensor networks (WSNs) in our daily life. However, locating sensor nodes is a challenging task in WSNs. Sensing data without an accurate location is worthless, especially in critical applications. The pioneering technique in range-free localization schemes is a sequential Monte Carlo (SMC) method, which utilizes network connectivity to estimate sensor location without additional hardware. This study presents a comprehensive survey of state-of-the-art SMC localization schemes. We present the schemes as a thematic taxonomy of localization operation in SMC. Moreover, the critical characteristics of each existing scheme are analyzed to identify its advantages
... Show MoreAutoimmune hepatitis is an inflammatory disease and its incidence has been increasing. The features of hepatitis are the release of inflammatory cytokines, the elevation of AST and ALT, and hepatocyte apoptosis and necrosis. Concanavalin A considered as essential model represents the acute immune-mediated liver damage in rodents. Thymoquinone is well known herbal compound that exert hepatoprotective, anti-inflammatory, and antioxidant activity. In this study, we focus on the immunoregulatory and liver protective effect of thymoquinone in a mouse model of concanavalin A-induced liver injury.
Twenty-four male mice were randomly divided into four groups each containing six animals: Negative control group, concanavalin A model group,
... Show MoreAbstract:
The research aims to clarify the impact of adopting the IFRS16 financial reporting standard on lease contracts in insurance companies on audit procedures. The change in the classification of lease contracts in the case of adopting the IFRS16 financial reporting standard necessarily requires audit procedures that are compatible with this change. A proposed audit program was prepared, guided by international auditing standards, based on the study of the client's environment and analysis of external and internal risks in the light of financial and non-financial indicators. The researchers reached a set of concl
... Show MoreZG Abdulrazaq, MR Younus, Nasaq, 2023