Preferred Language
Articles
/
LBjfhJcBVTCNdQwCZJmD
A Pragma-Semantic Analysis of Deontic and Epistemic Modality of legal Language in Selected Texts تحليل دلالي –تداولي لموقفية الالزام والمعرفية في اللغة القانونية لنصوص مختارة
...Show More Authors

Publication Date
Wed Jun 01 2022
Journal Name
Journal Of The College Of Languages (jcl)
"Words of threat in Hebrew language- Pragmatic study": ביטויי האיום בלשון העברית (עיון פרגמטי)
...Show More Authors
The present study approaches an analytical and deliberative analysis of the words of threat in number of Hebrew language examples through exploring all the reasons and conditions of threat act. Moreover, and because of the difficulty to make a distinction between the two verbs, the study discusses the use of the verbs “to warn and to threat” as one of the most common types verbs used in Hebrew language that implies internal threat. Threat is one of most prominent speech acts that language users resort to as a means to achieve intended threat goals. In Hebrew, it is expressed in different ways and depends on different aspects, including (internal and external context, circumstances in which the threat is made, the
... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 24 2016
Journal Name
Al-academy
Experimentation in caves painting (A comparative analysis): فريد خالد علوان
...Show More Authors

Addressed the problem of the research is marked (experimentation in caves fee) concept and its role in experimentation deviate Display Num formal charges caves. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then specify the search for the goals of (revealed the nature and role of experimentation in determining the nature of Manifesting fee documented on the walls of caves), followed by the establishment of the three search limits (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theoretical framework and indicators that resulted from academic theorizi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 25 2024
Journal Name
The Review Of Contemporary Scientific And Academic Studies
The Representation of Men and Women in the Black and White Streams of the Second Wave of Feminism: A Corpus Stylistic Analysis
...Show More Authors

View Publication
Crossref
Publication Date
Tue Nov 13 2018
Journal Name
Biochemical And Cellular Archives
Synthesis, characterization, structural, thermal, POM, studies, antimicrobial, and DNA cleavage activity of a new schiff base-azo lighand and its complexation with selected metal ions
...Show More Authors

RKRAS L. K. Abdul Karem, F. H. Ganim, Biochemical and Cellular Archives, 2018 - Cited by 2

View Publication
Publication Date
Wed Jun 19 2019
Journal Name
Biochemical And Cellular Archives
SYNTHESIS, CHARACTERIZATION, STRUCTURAL, THERMAL, POM STUDIES, ANTIMICROBIAL AND DNA CLEAVAGE ACTIVITY OF A NEW SCHIFF BASE-AZO LIGAND AND ITS COMPLEXATION WITH SELECTED METAL IONS
...Show More Authors

SYNTHESIS, CHARACTERIZATION, STRUCTURAL, THERMAL, POM STUDIES, ANTIMICROBIAL AND DNA CLEAVAGE ACTIVITY OF A NEW SCHIFF BASE-AZO LIGAND AND ITS COMPLEXATION WITH SELECTED METAL IONS

Scopus (3)
Scopus
Publication Date
Tue Dec 01 2009
Journal Name
Iraqi Journal Of Physics
Spectrophotometrically Analysis of PMMA as a low – Doses Dosimeter
...Show More Authors

Polymethylmethacrylate film (PMMA) of thickness 75 μm was evaluated Spectrophotometrically for using it as a low-doses gamma radiation dosimeter. The doses were examined in the range 0.1 mrad-10 krad. Within an absorption band of 200-400 nm, the irradiated films showed an increase in the absorption intensity with increasing the absorbed doses. Calibration curves for the changes in the absorption differences were obtained at 218, 301, and 343 nm. At 218 nm the response for the absorbed doses is a linear in the range 10 mrad- 10 krad. Hence it is recommended to be adopted as an environmental low doses dosimeter

View Publication Preview PDF
Publication Date
Sat Oct 15 2022
Journal Name
Communications In Mathematical Biology And Neuroscience
Modeling and analysis of a prey-predator system incorporating fear, predator-dependent refuge, and cannibalism
...Show More Authors

Using a mathematical model to simulate the interaction between prey and predator was suggested and researched. It was believed that the model would entail predator cannibalism and constant refuge in the predator population, while the prey population would experience predation fear and need for a predator-dependent refuge. This study aimed to examine the proposed model's long-term behavior and explore the effects of the model's key parameters. The model's solution was demonstrated to be limited and positive. All potential equilibrium points' existence and stability were tested. When possible, the appropriate Lyapunov function was utilized to demonstrate the equilibrium points' overall stability. The system's persistence requirements were spe

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Tue Oct 26 2021
Journal Name
Series On Biomechanics
Monitoring and analysis of plantar pressure map and foot motions using a wearable sensing system
...Show More Authors

Peer-Reviewed Journal

View Publication
Scopus (3)
Scopus
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Sun Apr 17 2016
Journal Name
Al-academy
Semantic displacement of the crucifixion of Jesus Christ in contemporary painting: عبد الحمزة عبد الأمير الكلابي، حيدر عبد الأمير رشيد الخزعلي
...Show More Authors

The search consists of four chapters, which are as follows: -First Chapter,The research shows the problem and the importance and its need, its aim and limits are to identify the terms of it consist. The problem of the research has been identified by answering the following question:How to representthe significant displacement of the Crucifixion of Jesus Christ in contemporary drawing? ,The aim of the research also has been discussed around what it represents: The significant displacement of the Crucifixion of Jesus Christ in contemporary drawingshows. As for the research limits .the portress which are taken from a variety of sources, and the period of time of the year (1945-2008).fearst chapter;The theoretical framework and previous stud

... Show More
View Publication Preview PDF
Crossref