Preferred Language
Articles
/
8hcFzY0BVTCNdQwCehtG
Schema Theory and Text- worlds: A Cognitive Stylistic Analysis of Selected Literary Texts
...Show More Authors

Cognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections.        Schema and text world theories are useful tools in cognitive stylistic studies. The reader's perception of a particular text world depends on her/his existing schema during the process of interpretation. The selected texts for the study are "Strange Meeting" by Wilfred Owen, "In Winter" by Corbett Harrison and the opening passage of David Lodge's novel Changing Places which are intended to show how the two theories can be integrated to account for the way in which text worlds are perceived. So as a result, readers start establishing meaning based on their schemata and these meanings change through adding a new one. The cognitive ability to understand literary texts and how readers build mind worlds is a crucial aim in cognitive poetics. An in-depth cognitive stylistic analysis reveals significant points about reading and interpreting the selected literary texts by providing a way of thinking about background knowledge and how the individual's experience would influence their interpretation and viewing of the  text world.

Crossref
Preview PDF
Quick Preview PDF
Publication Date
Mon Apr 15 2024
Journal Name
Journal Of Engineering Science And Technology
Text Steganography Based on Arabic Characters Linguistic Features and Word Shifting Method
...Show More Authors

In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn

... Show More
Publication Date
Fri Jun 30 2023
Journal Name
College Of Islamic Sciences
Al-Junaid al-Baghdadi's theory of happines
...Show More Authors

The research presents the "theory of happiness according to Junaid al-Baghdadi" and the theory's most significant characteristics.

The reasons for happiness, include knowledge, love, and providence, and happiness itself is the return of man or spirit to the source from which it originated.

View Publication Preview PDF
Publication Date
Thu Mar 31 2022
Journal Name
Journal Of The College Of Education For Women
The Impact of a Counseling Program with a Cognitive Reconstruction Method on the Development of the Psychological Hardness among Middle School Students
...Show More Authors

The current research aims to determine the impact of the cognitive reconstruction program on the development of psychological hardness among middle school students through the experimental verification of three hypotheses. The research sample consisted of (16) out of (450) students selected from Ibn Rushud preparatory school- Al-Rusafa 2. These participants have been randomly distributed into two equal groups. The researcher has used the method of cognitive reconstruction with the experimental group, whereas with the controlling group, he used nothing. The researcher has further used the scale of psychological hardness of Kobassa with the participants; the scale has been built in a way that suits the sample of the study, which consisted

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 14 2023
Journal Name
Journal Of Educational And Psychological Researches
Cognitive Balance of Students in the Kindergarten department
...Show More Authors

Abstract

Balance is a psychological need and a requirement of importance as the individual seeks to maintain it.  The research problem is summarized in the question: do students in the kindergarten department have a cognitive balance? The research aims to identify the cognitive balance of students in the kindergarten department and to identify if there are differences among students of the four stages according to the cognitive balance. The research community was limited to the students in the kindergarten department at the University of Baghdad / College of Education for Women and Al-Mustansiriya University / College of Basic Education and Iraqi University / College of Education for Women for the academic y

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Meta Gene
Association analysis of FTO gene polymorphisms rs9939609 and obesity risk among the adults: A systematic review and meta-analysis
...Show More Authors

View Publication
Scopus (10)
Scopus
Publication Date
Sat Apr 01 2017
Journal Name
1st Ijrtess – 2017 First International Conference On Recent Trends Of Engineering Sciences And Sustainability
Measuring Cohesion and Place Attachment of Selected Neighborhoods in Al-Adhamiya
...Show More Authors

Historic centers are often subject to urban renewal without the prior knowledge of the extent of the cohesion and attachment to place of its inhabitants. Identifying the rates of cohesion and place attachment can help urban designers to avoid decisions that lead to clashes with the reality of the social groups inhabiting the neighborhoods of the historic center. So the research aimed to measure cohesion and place attachment in a methodological approach based on a psychological instrument conducted by previous studies .The measurements were applied through a questionnaire given to the residents of six elected neighborhoods forming the historic center of Al- Adhamiya.The research assumed the relative disparity rates of cohesion and place atta

... Show More
Publication Date
Fri Aug 29 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Oral health status in relation to selected salivary elements among a group of gasoline stations workers
...Show More Authors

Background: Gasoline constituents and its derivatives had many hazardous effects on the general health of humans. Thus, gasoline stations workers may be affected by different types of related diseases.This study was conducted to assess selected salivary elements and their relation with dental caries, oral hygiene status and periodontal diseases among gasoline stations workers in comparison with individuals have no regular exposure to gasoline. Materials and methods: The study group consists of thirty male subjects with an age range (33-39) years who worked in different gasoline stations in different areas of Baghdad city and thirty persons that matching in age and gender and not exposed to gasoline were selected as a control group. Dental c

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 15 2022
Journal Name
Al-academy
The semiotic approach in analyzing contemporary graphic text
...Show More Authors

With a great diversity in the curriculum contemporary monetary and visions, and development that hit the graphic design field, it has become imperative for the workers in the contemporary design research and investigation in accordance with the intellectual treatises and methods of modern criticism, because the work design requires the designer and recipient both know the mechanics of tibographic text analysis in a heavy world of texts and images varied vocabulary and graphics, and designer on before anyone else manages the process of analysis to know what you offer others of shipments visual often of oriented intended from behind, what is meant, in the midst of this world, the curriculum Alsemiae directly overlap with such diverse offer

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More