The paper attempts to find out the elements of picaresque novel in selected English and Iraqi novels. It studies these elements in Henry Fielding’s Joseph Andrews and Adil Abduljabbar’s Arzal Hamad Al-Salim. The paper is divided into four sections. The first is an introduction to the picaresque novel. It gives a definition, a historical background, and the elements of the genre. The second section studies Fielding’s novel focusing on the elements of this type of novel and how it affects the story itself. The paper follows the novel from the beginning to the end showing these elements. The third is dedicated to Abduljabbar’s novel and how the elements of picaresque genre appear in the novel and play an important role in its development of action, themes, and characterization. The fourth is the conclusion that sums up the findings of the paper and shows a comparative approach for the two novels.
This study explores the semiotic aspects of American slang, specifically focusing on the phenomenon of reduplicative expressions in informal speech. Despite the extensive research on American slang, limited attention has been given to the cultural and mythical meanings embedded within reduplicative expressions. To address this gap, the study investigates how these expressions convey denotative, connotative, and mythical meanings within casual American discourse. The objectives of the study include: 1. To what extent does Barthes’ semiotic model hold potential for application in this study? 2. How are reduplicative slang expressions widely used in everyday American life? 3. To what extent do qualitative and quantitative methods hav
... Show MoreAbstract
Business organizations are using the technological innovations like cloud computing (CC) as a developmental platform in order to improve the performance of their information systems. In that context, our paper discusses know-how in employing the public and private CC to serve as platforms to develop the evaluation system of annual employees' performance (ESAEP) at Iraqi universities. Therefore, we ask the paper question which is “Is it possible to adopt the innovative solutions of ICTs (Like: public and private CC) for finding the developmental vision about management information systems at business organizations?”. In addition, the paper aim
... Show MoreThis paper aims at studying the illocutionary speech acts: direct and indirect to show the most dominant ones in a presidential speech delivered by the USA president. The speech is about the most critical health issue in the world, COVID-19 outbreak. A descriptive qualitative study was conducted by observing the first speech delivered by president Trump concerning coronavirus outbreak and surveying the illocutionary acts: directive, declarative, commissive, expressive, and representative. Searle's (1985) classification of illocutionary speech acts is adopted in the analysis.
What are the main types of the illocutionary speech acts performed by Trump in his speech?; Why does
... Show MoreThe present study examines the main points of differences in the subject of greetings between the English language and the Arabic language. From the review of the related literature on greetings in both languages, it is found that Arabic greeting formulas are more elaborate than the English greetings, because of the differences in the social customs and the Arabic traditions and the Arabic culture. It is also found that Arabic greetings carry a religious meaning basing on the Islamic principle of “the same or more so”, which might lead to untranslatable loopholes when rendered in English.
Traditionally, style is defined as the expressive, emotive or aesthetic emphasis added linguistically to the discourse with its meaning is the same. In the current study, however, style is defined as the linguistic choice that the language users can make for specific purposes.
This study, thus, aims at analyzing political Arabic and English speeches to find out whether there are differences of style between English and Arabic and whether the choices the language users make can show any traits of their psychological status.
To fulfill the above aims, the study hypothesizes that English and Arabic speeches can be analyzed stylistically and that there are stylistic difference
... Show More The research addresses the most important elements of the ancient Iraqi heritage represented by architecture and plastic arts being the direct means that preserved the heritage due to the ease of preserving them and the speed of circulating them and diversity of their topics. Through the features of these elements, the research problem has been defined in the form of questions including: what are the most important elements of the ancient Iraqi heritage? What are the plastic arts? What are the most important topics adopted? What is the concept of palm in the ancient Iraqi heritage? What is the evidence for that?
Has it been employed in the Iraqi contemporary art? What is the evidence for that? How to employ it in the arts and t
In addition to its basic communicative function, language can be used to imply information that is not actually stated, i.e. addressers do not always state exactly (or directly) what they mean. Such instances fall within the domain of pragmatics in that they have to do with how addressers use language to communicate in a particular situation by implication rather than by direct statement. The researcher attempts to demonstrate that the beauty and the multiple layers of meaning in poetry can be better explored if the addressee looks at the lines from a pragmatic perspective in search for implied meaning. There are many devices that can convey implied meaning in poetry, among which are 'rhetorical', 'figurative' or 'literary' devices. But
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The construction industry in Iraq suffers from many problems, perhaps the most important of which is the delay in time and the increase in costs. Therefore, it was necessary to try to adopt a new methodology that would help in overcoming these problems. It was suggested to combine building information modeling with the agile management approach because this technique and methodology is modern and helps in reducing time and cost and improving quality. This paper aims to know the status of using Building Information Modeling (BIM) and Agile Project management (APM) in Iraq and to shed light on the merging of this integration, explaining the benefits, difficulties, and workflow practices, finding the most influencing factors on the tim
... Show More