Preferred Language
Articles
/
3IanbYYBIXToZYALe4lO
Conversation Analysis of Forum: a Selected Text from Paul S. Kemp Online Journal

Language as a means of communication has long been the concern of many conversation analysts in their studies such as: Sacks et al. (1974), Schegloff et al. (1977), Duncan (1972), Grice (1975) and Burton (1980). Burton has attempted analyzing the first ten transitions of the play “The Dumb Waiter” for mere a presentation of her approach. This paper aims at analyzing the conversational structure of forum on the subject of literary fiction and genre fiction by applying Burton’s model (1980) of analysis to answer the question to what extent this model is applicable in analyzing the presented text. The findings of the investigation have proved the applicability of the structure of conversation formulated by Burton (1980) in her model without modification.

Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Phonological features   For spoken text in the language

This research attempted to take advantage of modern techniques in the study of the superstructural phonetic features of spoken text in language using phonetic programs to achieve more accurate and objective results, far from being limited to self-perception and personal judgment, which varies from person to person.
    It should be noted that these phonological features (Nabr, waqf, toning) are performance controls that determine the fate of the meaning of the word or sentence, but in the modern era has received little attention and attention, and that little attention to some of them came to study issues related to the composition or style Therefore, we recommend that more attention should be given to the study of

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
Crossref
View Publication
Publication Date
Wed Dec 15 2021
Journal Name
Al-academy
The role of psychological content in building the fiction film an analytical study of a selected sample

 Psychological aspects are a major influence and motivation factor in many cinematic and television works such as television series. There are many films that dealt with psychological issues through the personality affected by psychological projections and complexes that lead towards abnormal behavior and actions in most cases, so the researchers chose the title and the research problem was raised through the following question: What is the mechanism that fulfills a psychological role in the narrative film? The objectives of the research were to reveal the mechanism used to instill psychological contents in the feature film? As for the limits of the research, it was an intentional sample, and the researchers adopted the descriptive anal

... Show More
Crossref
View Publication Preview PDF
Publication Date
Fri Aug 28 2020
Journal Name
Iraqi Journal Of Science
Probiotic Application of Bacteriocin-Producing S. Epidermidis in A Cellulosic Pad to Treat Some Skin Infections

The aim of this study was to evaluate the possibility of using Staphylococcus epidermidis cells as a probiotic to treat some skin infections. For this purpose, S. epidermidis Y73, which is an active bacteriocin producer and non-biofilm forming isolate, was selected among 134 skin isolates through primary and secondary screening. Tryptic soya broth was selected as the best medium to support bacteriocin production, while the optimal pH and temperature for S. epidermidis Y73 growth were 7 and 37°C, respectively, which were invested in the formula preparation. Furthermore, the possibility of using this isolate as a probiotic was investigated by preparing 4 potential cellulosic pads with 4 different formulae whic

... Show More
Scopus (2)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of sulcular green tea extract irrigation on experimental rabbit’s gingivitis (A histopathological study)

Background: Considering the antioxidant, anti-inflammatory, and antimicrobial properties of green tea, this study aimed to evaluate the histopathological effect of the sulcular irrigation of green tea extract in the treatment of experimental gingivitis in rabbit.

Materials and methods: For this experimental study, 45 male rabbits, separated in two groups, control non- irrigated group (5rabbits) and study group (40 rabbits), gingivitis induced by ligatures was packed subgingivally in the lower right central incisors of the experimental group for seven days. Then, the animals were randomly designated to two irrigated groups (20 rabbits

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Prepodavatel Xxi Vek
Crossref
View Publication Preview PDF
Publication Date
Wed Oct 12 2022
Journal Name
College Of Islamic Sciences
The Concept of the Text, its Divisions, Connotations, and Methodology

The text has many connotations in the Arabic language, such as vowel points, designation, completion, etc., and the original meaning of the text is to show. The Western text has its owen independent semantic unit .The biblical texts are a mixture of what was reported by the Prophet Moses (peace be upon him) and what the authors described in terms of texts over many centuries.The meaning of the text is guidance and payment, and it is a natural connotation. The religious text for Muslims is divided into peremptory texts that are national proof. The evidence for the meaning of the text is proven by language, and it is not required that the researcher be a jurist. The approach is a factual questionnaire by the researcher according to a speci

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
Crossref
View Publication Preview PDF