Preferred Language
Articles
/
3IanbYYBIXToZYALe4lO
Conversation Analysis of Forum: a Selected Text from Paul S. Kemp Online Journal
...Show More Authors

Language as a means of communication has long been the concern of many conversation analysts in their studies such as: Sacks et al. (1974), Schegloff et al. (1977), Duncan (1972), Grice (1975) and Burton (1980). Burton has attempted analyzing the first ten transitions of the play “The Dumb Waiter” for mere a presentation of her approach. This paper aims at analyzing the conversational structure of forum on the subject of literary fiction and genre fiction by applying Burton’s model (1980) of analysis to answer the question to what extent this model is applicable in analyzing the presented text. The findings of the investigation have proved the applicability of the structure of conversation formulated by Burton (1980) in her model without modification.

Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding text in gray image using mapping technique
...Show More Authors

Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Phonological features   For spoken text in the language
...Show More Authors

This research attempted to take advantage of modern techniques in the study of the superstructural phonetic features of spoken text in language using phonetic programs to achieve more accurate and objective results, far from being limited to self-perception and personal judgment, which varies from person to person.
    It should be noted that these phonological features (Nabr, waqf, toning) are performance controls that determine the fate of the meaning of the word or sentence, but in the modern era has received little attention and attention, and that little attention to some of them came to study issues related to the composition or style Therefore, we recommend that more attention should be given to the study of

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 08 2024
Journal Name
Al-academy
Medea Euripides between text and contemporary theatrical presentation
...Show More Authors

It is not available for us to go back in time and see plays old and it plays giants tragedy ancient Greek (Aeschylus, Sofokls, and yourbedes) through the eyes of a generation ago, and if we were able to go back to Ntegathm play it is certain that we will not taste or Nstassig for much of what we see from these offers will not afford the traditional religious rituals, which was accompanied also dance and music in the style of ancient Greek play was representing a large part of the theater see manifestations Can our eyes and ears we twentieth century audience to accept those appearances, and it was then?
Inevitably it will look like a museum bycollection not only. So we find ourselves in the light of the foregoing forced When you do rem

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 02 2019
Journal Name
Advances In Intelligent Systems And Computing
Spin-Image Descriptors for Text-Independent Speaker Recognition
...Show More Authors

Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Sep 22 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Oral health status in relation to selected salivary elements among a group of gasoline stations workers
...Show More Authors

Background: Gasoline constituents and its derivatives had many hazardous effects on the general health of humans. Thus, gasoline stations workers may be affected by different types of related diseases.This study was conducted to assess selected salivary elements and their relation with dental caries, oral hygiene status and periodontal diseases among gasoline stations workers in comparison with individuals have no regular exposure to gasoline. Materials and methods: The study group consists of thirty male subjects with an age range (33-39) years who worked in different gasoline stations in different areas of Baghdad city and thirty persons that matching in age and gender and not exposed to gasoline were selected as a control group. Dental c

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 22 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Immunohistochemical expression of ICAM-1 and Cortactin as cell adhesive molecule and invasive markers in Hodgkin’s and non-Hodgkin’s lymphoma of the head and neck region (A comparative study)
...Show More Authors

Background: Lymphomas are a group of diseases caused by malignant lymphocytes that accumulate in lymph nodes and cause the characteristic clinical features of lymphadenopathy. Intercellular adhesion molecule-1 (ICAM-1) (CD54) is a transmembrane glycoprotein belonging to the immunoglobulin superfamily of adhesion molecules. Cortactin was first identified as one of the major substrates for src kinase. because it localized to Cortical actin structures, The aims of this study was to evaluate and compare the immunohistochemical of ICAM-1 expression as cell adhesion molecule marker and Cortactin expression as invasive marker. Material and Methods: This study was performed on (68) formalin-fixed, paraffin-embedded blocks, histopathologically diagn

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 15 2021
Journal Name
Al-academy
The role of psychological content in building the fiction film an analytical study of a selected sample
...Show More Authors

 Psychological aspects are a major influence and motivation factor in many cinematic and television works such as television series. There are many films that dealt with psychological issues through the personality affected by psychological projections and complexes that lead towards abnormal behavior and actions in most cases, so the researchers chose the title and the research problem was raised through the following question: What is the mechanism that fulfills a psychological role in the narrative film? The objectives of the research were to reveal the mechanism used to instill psychological contents in the feature film? As for the limits of the research, it was an intentional sample, and the researchers adopted the descriptive anal

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 12 2022
Journal Name
College Of Islamic Sciences
The Concept of the Text, its Divisions, Connotations, and Methodology
...Show More Authors

The text has many connotations in the Arabic language, such as vowel points, designation, completion, etc., and the original meaning of the text is to show. The Western text has its owen independent semantic unit .The biblical texts are a mixture of what was reported by the Prophet Moses (peace be upon him) and what the authors described in terms of texts over many centuries.The meaning of the text is guidance and payment, and it is a natural connotation. The religious text for Muslims is divided into peremptory texts that are national proof. The evidence for the meaning of the text is proven by language, and it is not required that the researcher be a jurist. The approach is a factual questionnaire by the researcher according to a speci

... Show More
View Publication Preview PDF