Preferred Language
Articles
/
CRePZJMBVTCNdQwCiNN1
A Feminist Rhetorical Analysis of Anti-feminist Poetry in English and Arabic

Crossref
View Publication
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of The College Of Languages (jcl)
Formal and Functional Perspectives in the Analysis of Hyperboles in Obama's Speeches

     Hyperbole is an obvious and intentional exaggeration in the sense that it takes things to such an extreme that the audience goes too far and then pulls itself back to a more reasonable position, i.e. it is an extravagant statement or figure of speech not intended to be taken literally. This paper focuses on the formal and functional perspectives in the analysis of hyperbole which American candidates produce in their speeches in electoral campaigns, for it is hypothesized that candidates in their electoral campaigns use hyperbolic expressions excessively to persuade voters of the objectives of their electoral campaign programs. Hence, it aims to analyze hyperbole in context to determine the range of pragmatic func

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Opcion
Enhancing Islamic Concepts through English Children's Lit-erature: Al- Ibtila, The Test of Patience

Publication Date
Thu Dec 20 2018
Journal Name
Al-adab Journal
An Evaluation of the "English for Iraq" Course for the Fifth Grade Secondary Schools

Providing Iraqi students with proficiency in English is the ultimate goal of the educational system which is a way of getting knowledge in the fields of arts, sciences, transferring knowledge and sciences to other communities. Therefore, conducting such a type of study is very important because the contents of English textbooks have a huge influence on learning of the students. Once the content of English textbooks contain errors as the correct one, this will effect on his/her learning. The present study is an attempt to evaluate the new course entitled “English for Iraq” for fifth grade students for secondary schools, by Olivia Johnston and Mark Farell. It aims to answer eleven questions relating to the following domains: strength, obj

... Show More
Crossref
View Publication
Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
The Degree of Student Teachers Acquisition at Sultan Qaboos University in Skills of Teaching Arabic via A Virtual Micro-Teaching Lab Based on their Point of View

The study aims to investigate the degree of student teachers at Sultan Qaboos University acquired skills in teaching Arabic via a virtual micro-teaching lab, as well as to reveal the difficulties they faced and their development proposals. To do this, the researchers developed a questionnaire divided into four dimensions: planning, implementation, evaluation, and

ethical values for the teaching profession, in addition to two open-ended questions to identify difficulties and suggestions. It was administered to (30) student teachers. The results revealed that the average degree of student-teacher acquisition of skills was high in its four dimensions. It ranged between (39.2) to (82.2), while the overall average was (56.2).

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 07 2020
Journal Name
Journal Of Legal Sciences
The Occupier's Civil Liability in the English Law. An Analytical Comparative Study with the Iraqi Civil Law

The occupier’s civil liability in English law is considered as one of the main types of the responsibility imposed by the law of Torts. and is regarded as a special system of the civil liability arising from negligence, as well as two other systems, that is to say , the employer’s non-contractual liability and  The liability from defective products. It is worth-bearing in mind that the common law has imposed on the occupier of the premises a duty of safety towards those who enter his premises. And two English legislations have been enacted later to regulate this type of liability legislatively, namely, the Occupier's liability Act 1957 and the Occupier's liability Act 1984. Whereas the Iraqi civil law No. 40 of 1951 has regulate

... Show More
Crossref
View Publication Preview PDF
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of the indicators of the educational process and scientific levelUsing the analysis of variance of ordered data in repeated measurements

In this research want to make analysis for some indicators and it's classifications that related with the teaching process and the            scientific level for graduate studies in the university by using analysis of variance for ranked data for repeated measurements instead of the ordinary analysis of variance . We reach many conclusions  for the                         

important classifications for each indicator that has affected on   the teaching process.         &nb

... Show More
Crossref
View Publication Preview PDF
Publication Date
Thu Sep 15 2022
Journal Name
Alustath Journal For Human And Social Sciences
The Impact of Mind and Informational Strategy on the ‎Achievement of the Second Intermediate Students in the Grammar ‎of Arabic Language

The aim of the current research is to recognizing the impact of mind and informational strategy on the achievement with the second intermediate students in the grammar of arabic language, the researcher used a partial-set experimental design and intentionally selected a sample out of the second intermediate class from (AL- Markazya Intermediate school) in the district of Hilla, affiliated which belongs to General Directorate of Babylon Education in the year (2020-2021) for applying the experiment. The sample was composed of (50) students, (25) ones for each group, the experimental group and normal one. The researcher balanced between the two groups in various changes including: (the chronological age counted by months, the academic achie

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Jul 02 2023
Journal Name
Iraqi Journal Of Science
Brucella melitensis Rev.1 live attenuated Vaccine and its DNA induced IFN- γ and anti-ds DNA antibodies production in rats

Brucellosis is one of the five common bacterial zoonoses in the world caused by
organisms belonging to the genus Brucella. Immune recognition of bacterial
infection may contribute to cytokine, as well as antibody production that are
characteristic of innate and adaptive responses. In this study, the presence of
attenuated live Brucella melitenses Rev1 bacteria or its DNA induced the immune
system to produce IFN-γ and anti-ds DNA antibody. In respect to IFN-γ released,
the B. melitensis Rev 1 attenuated live vaccine was able to stimulate the immune
system more than the DNA (P≤0.05). Such finding could be attributed to the whole
attenuated bacteria that have immunogenic factors other than the DNA like cell wall<

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
Analysis of Methods and Techniques Used for Speaker Identification, Recognition, and Verification: A Study on Quarter-Century Research Outcomes

The theories and applications of speaker identification, recognition, and verification are among the well-established fields. Many publications and advances in the relevant products are still emerging. In this paper, research-related publications of the past 25 years (from 1996 to 2020) were studied and analysed. Our main focus was on speaker identification, speaker recognition, and speaker verification. The study was carried out using the Science Direct databases. Several references, such as review articles, research articles, encyclopaedia, book chapters, conference abstracts, and others, were categorized and investigated. Summary of these kinds of literature is presented in this paper, together with statistical analyses

... Show More
Scopus (6)
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More