Preferred Language
Articles
/
MhdLA44BVTCNdQwCMi_p
Ironic Metonymy in Russian and Arabic
...Show More Authors

This article is devoted to the cognitive study of ironic metonymy in Russian and Arabic. Metonymy and irony have traditionally been seen as parallel linguistic phenomena. But their formation and interpretation are based on different cognitive mechanisms. At the formal and functional level, metonymy and irony have a number of significant differences. Metonymy is an artistic technique, the mechanism of which is based on obvious, easily traced connections between objects and phenomena of the surrounding world. Irony is a satirical technique or a rhetorical figure that is used to create a certain artistic image, aimed at forming the hidden meaning of the statement. A native speaker intuitively feels the difference between metonymy and irony and expresses it in a linguistic form. Аннотация Данная статья посвящена когнитивному исследованию иронической метонимии в русском и арабском языках. Метонимия и ирония традиционно рассматривались как параллельные языковые явления. Но в основе их образования и интерпретации лежат разные когнитивные механизмы. На формальном и функциональном уровне метонимия и ирония имеют ряд существенных различий. Метонимия – художественный прием, в основе механизма которого лежат очевидные, легко прослеживаемые связи предметов и явлений окружающего мира. Ирония – сатирический прием либо риторическая фигура, которые используются для создания определенного художественного образа, направлены на формирование скрытого смысла высказывания. Носитель языка интуитивно чувствует разницу между метонимией и иронией и выражает ее в языковой форме. Имеют метонимия и ирония много общих характеристик с точки зрения семантики и коммуникативных свойств. Они представляют собой лингвистически двухслойные явления, в которых проявляется творческая функция языка.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
Microbiological Examination of some ImportedCanned and Frozen Foods
...Show More Authors

A number of juices, jams, canned foods and frozen fishes available in local markets were inspected with respect to microbial contamination. We have determined the total viable bacterial cell counts in these samples and the number of g(-) lactose fermentors as a bacterial indicator of food spoilage. The results indicated that most of the food items inspected, were contaminated with large numbers of different species of g(-) ,g(+), yeast and fungi and some were contained more than the maximum permissible number of pathogenic g(-) enteric E-coli, which render these food items unsafe for human consumption.

View Publication Preview PDF
Crossref
Publication Date
Fri Jun 18 2004
Journal Name
Iraqi Journal Of Laser
Quantum Cryptography and a Quantum Key Distribution Protocol
...Show More Authors

In this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.

View Publication Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
2019 International Conference On Electrical Engineering And Informatics (iceei)
Health Information Exchange: Current Trends, Challenges and Recommendations
...Show More Authors

View Publication
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Effective Rules for Building and Securing of Blogs
...Show More Authors

Blogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 29 2019
Journal Name
Annals Of Tropical Medicine And Public Health
Histopathological study of hepatic and pulmonary sheep's hydatidosis
...Show More Authors

View Publication
Publication Date
Sun Apr 14 2024
Journal Name
International Journal Of Disabilities Sports & Health Sciences
How precision, strength and flexibility affect badminton skills
...Show More Authors

The importance of the research lies in developing flexibility exercises (positive and negative) that help improve the level of physical and skill performance, address some weak points, and develop factors that work to implement skills with a wider range of motion, accuracy, and high strength. This is what makes the game of badminton more developed and successful. Performing (dimensions) strokes And the forward projection) by not using the wrist and the correct movement of the striking arm. This makes the player’s performance ineffective, which requires her to practice flexibility and movement flow to address this weakness. The study aims to prepare exercises using flexibility (positive and negative) and to know the e

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jun 30 2016
Journal Name
Al-kindy College Medical Journal
Association between periodontitis and acquired coronary heart disease
...Show More Authors

Background: The association between oral microbial infection and systemic disease is not a new concept. A major confounding issue is that oral infections often are only one of the many important factors that can influence systemic diseases .Objective: This study was conducted to evaluate the periodontal health status of patients with acquired coronary heart disease. Type of the study: Cross-sectional study.Methods: The study group consisted of 200 patients with an age range (35-70) years, having coronary heart disease .This study group were compared to a control group of non-coronary heart disease (200 individuals ) matching with age and gender. The oral parameters were examined including the periodontal conditions, assessment of periodo

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
Relationship between Diabetes mellitus and Urinary tract infections
...Show More Authors

Blood and urine samples were collected from 203 patients to study the relationship between Diabetes mellitus and urinary tract infections (UTI). Blood and urine specimens were subjected for estimation of random blood sugar, in addition to detection of the most pathogen bacteria which cause urinary tract infection in diabetic patients. The study included the detection of bacterial sensitivity to some antibiotics used in treating urinary tract infections, and also included the study of genetic basis which cause both types of diabetes mellitus. The results can be summarized as follows: The incidence of type ? diabetes in males was (35.8%), and (45.9%) in females . and type 2 diabetes in males was (49.6%), while in females was (40.16%).The inc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 14 2014
Journal Name
International Journal Of Computer Applications
Parallelizing RSA Algorithm on Multicore CPU and GPU
...Show More Authors

View Publication
Crossref (10)
Crossref