Preferred Language
Articles
/
8hcFzY0BVTCNdQwCehtG
Schema Theory and Text- worlds: A Cognitive Stylistic Analysis of Selected Literary Texts
...Show More Authors

Cognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections.        Schema and text world theories are useful tools in cognitive stylistic studies. The reader's perception of a particular text world depends on her/his existing schema during the process of interpretation. The selected texts for the study are "Strange Meeting" by Wilfred Owen, "In Winter" by Corbett Harrison and the opening passage of David Lodge's novel Changing Places which are intended to show how the two theories can be integrated to account for the way in which text worlds are perceived. So as a result, readers start establishing meaning based on their schemata and these meanings change through adding a new one. The cognitive ability to understand literary texts and how readers build mind worlds is a crucial aim in cognitive poetics. An in-depth cognitive stylistic analysis reveals significant points about reading and interpreting the selected literary texts by providing a way of thinking about background knowledge and how the individual's experience would influence their interpretation and viewing of the  text world.

Crossref
Preview PDF
Quick Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
Choosing Appropriate Distribution ‏‎by Minitab’s 17 Software to Analysis System Reliability
...Show More Authors

This research aims to choose the appropriate  probability ‎ distribution  ‎‏‎ to the reliability‎        analysis‎ for  an   item through ‎ collected data for operating and stoppage  time of  the case  study.

    Appropriate choice for .probability distribution   is when  the data look to be on or  close the form fitting line for probability plot and test the data  for  goodness of fit .

     Minitab’s 17 software  was used ‎  for this  purpose after  arranging collected data and setting it in the the program‎.

 &nb

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Use Principal Component Analysis Technique to Dimensionality Reduction to Multi Source
...Show More Authors

This paper tackles with principal component analysis method (PCA ) to dimensionality reduction in the case of linear combinations to digital image processing and analysis. The PCA is statistical technique that shrinkages a multivariate data set consisting of inter-correlated variables into a data set consisting of variables that are uncorrelated linear combination, while ensuring the least possible loss of useful information. This method was applied to a group of satellite images of a certain area in the province of Basra, which represents the mouth of the Tigris and Euphrates rivers in the Shatt al-Arab in the province of Basra.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Tue Dec 31 2024
Journal Name
Journal Of Emergency Medicine, Trauma And Acute Care
Histological variety analysis for pleomorphic adenoma in salivary glands: Retrospective study
...Show More Authors

Pleomorphic adenoma (PA) is the most frequent benign epithelial neoplasm of salivary glands, displaying a remarkable degree of morphological variety. The aim of the study is to illustrate the clinicopathological characteristics of PA with particular emphases on epithelial cell morphology and mesenchymal elements. Materials and Methods: A total of 132 PA collected between 2002 and 2017 were recruited from Al Shahid Ghazi Al Hariri Hospital and the Department of Oral Pathology, College of Dentistry, Baghdad University, Baghdad, Iraq, and analyzed for their demographic and histopathological features. All data were analyzed using descriptive statistics. A slightly higher incidence of PA was detected in females (52.3%) compared to male subject

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Optics & Laser Technology
Finite element thermal analysis for PMMA/st.st.304 laser direct joining
...Show More Authors

This work is concerned with building a three-dimensional (3D) ab-initio models that is capable of predicting the thermal distribution of laser direct joining processes between Polymethylmethacrylate (PMMA) and stainless steel 304(st.st.304). ANSYS® simulation based on finite element analysis (FEA) was implemented for materials joining in two modes; laser transmission joining (LTJ) and conduction joining (CJ). ANSYS® simulator was used to explore the thermal environment of the joints during joining (heating time) and after joining (cooling time). For both modes, the investigation is carried out when the laser spot is at the middle of the joint width, at 15 mm from the commencement point (joint edge) at traveling time of 3.75 s. Process par

... Show More
View Publication
Scopus (46)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Wed Sep 30 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Digital Rock Samples Porosity Analysis by OTSU Thresholding Technique Using MATLAB
...Show More Authors

Porosity plays an essential role in petroleum engineering. It controls fluid storage in aquifers, connectivity of the pore structure control fluid flow through reservoir formations. To quantify the relationships between porosity, storage, transport and rock properties, however, the pore structure must be measured and quantitatively described. Porosity estimation of digital image utilizing image processing essential for the reservoir rock analysis since the sample 2D porosity briefly described. The regular procedure utilizes the binarization process, which uses the pixel value threshold to convert the color and grayscale images to binary images. The idea is to accommodate the blue regions entirely with pores and transform it to white in r

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sat Jun 29 2024
Journal Name
Journal Of Humanities And Social Sciences Researches
Measuring and Analysis the Relationship between the Internal Public Debt and the Exchange Rate in the Iraqi Economy for The Period 2004 – 2022
...Show More Authors

The scholastic view of public religion differed, and this difference was on two extremes. All economic schools agreed that public debt is a monetary liquidity that was unjustly deducted from the income and output cycle as a result of the imbalance in the economic balance and the departure from the conditions of balance between aggregate demand and aggregate supply. Debt is a waste of financial resources allocated to productive accumulation. Except for the Keynesian school, which considers public debt to be an addition to aggregate demand after the decline in the role of the private sector in investment as a result of pessimistic expectations that warn of signs of economic contraction. Public debt is linked to the ex

... Show More
Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Account the expected values ??for a single particle to a group of atoms and ions
...Show More Authors

Technique was used to retail for analyzing atom beryllium ion cathode of an atom lithium to six pairs of functions wave which two ?????? and the rest of the casing moderation and to analyze atom lithium ion Mob atom beryllium to three pairs of functions wave pair of casing and the rest of the casing moderation using function wave Hartree Fock and each casing email wascalculate expected values ??....

View Publication Preview PDF
Publication Date
Wed Sep 15 2021
Journal Name
Journal Of Baghdad College Of Dentistry
Diet and orthodontics- A review
...Show More Authors

During the course of fixed orthodontic therapy, patients should be instructed to eat specific food stuffs and beverages in order to maintain good health for the dentition and supporting structures and prevent frequent attachment debonding that prolong the treatment duration. After searching and collecting articles from 1930 till July 2021, the current review was prepared to emphasize various types of foods that should be taken during the course of fixed orthodontic therapy and to explain the effect of various food stuffs and beverages on the growth and development of craniofacial structures, tooth surfaces, root resorption, tooth movement, retention and stability after orthodontic treatment and the effect on the components of fixed ortho

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Engineering And Applied Sciences
The role of e-Government on corruption and its impact on the financial performance of the government: An empirical analysis on the Iraqi government
...Show More Authors

This study aimed to provide a conceptual model for the use and benefits of the e-Government as related to administrative fraud and financial corruption. The study also looked into their concepts, forms, dimensions and types and the role of e-Government on fraud reduction, corruption in administration and finance and its impact on the government performance. From the result, it is revealed that there is need for electronic government for implementation in order to curb the rate of fraud and administrative and financial corruption and improve the quality of service provision for better performance

Scopus (15)
Scopus