Preferred Language
Articles
/
PRdr540BVTCNdQwC6il6
Advantages of Seoran's critical speech
...Show More Authors

View Publication
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of The College Of Languages (jcl)
Gender and Supportive Moves of Criticism: Evidence from Iraqi-Arabic and Malay Speech Communities
...Show More Authors

This study aims to reveal the similarities and differences between Iraqi and Malay university learners and their genders in producing the supportive moves of criticism. To this end, 30 Iraqi and 30 Malay university learners have participated in this study. A Discourse Completion Test (DCT) and a Focus Group Interview (FGI) are conducted to elicit responses from the participants. Nguyen’s (2005) classification of criticism supportive moves is adapted to code the data. The data are analysed qualitatively and quantitatively. Overall, the findings unveil that both groups use similar categories of supportive moves, but Iraqis produce more of these devices than Malays in their criticisms. Although both females and males of both groups use id

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 27 2018
Journal Name
Journal Of The College Of Education For Women
The Referential Aspect of the Quranic Text Az-Zahraa’s)Peace Be Upon Her( Speech
...Show More Authors

In the present paper, the researcher attempts to shed some light on the objective behind inserting some Qur'anic verses by Al-Zahraa (Peace Be Upon Her) in her revered speech. Besides, it tries to investigate the hidden meaning of these verses and to study them in the light of pragmaticreferences. This task is supported by Books of Tafseer as well as the books that explained this speech to arrive at its intended meaning. It is possible say that this is astep towards studying speeches of 'Ahlul Bayt' (People of the Prophet's household) in terms of modern linguistic studies, as well as employing modern methods to explore the aesthetic values of these texts.

View Publication Preview PDF
Publication Date
Mon Dec 15 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Immunohistochemical expression of MMP9, as a marker of local invasion in Hodgkin’s and Non-Hodgkin’s lymphoma of the head and neck region
...Show More Authors

Background: Malignant lymphoma is the generic term given to tumors of the lymphoid system and specifically of lymphocytes and their precursor cells, While all lymphomas are malignant neoplasms, there is a wide spectrum of clinical behavior, with some following an indolent clinical course and others behaving in an aggressive manner (will causing death in a short time frame if left untreated). The metastatic process involves intravasation and extravasation of tumor cells, followed by reimplantation of tumor cells, formation of a new tumor stoma, Degradation of the extracellular matrix and components of the basement membrane by proteases facilitates the detachment of tumor cells, their crossing of tissue boundaries, and invasion into adjacent

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Numerical Computations of Transonic Critical Aerodynamic Behavior of a Realistic Artillery Projectile
...Show More Authors

The determination of aerodynamic coefficients by shell designers is a critical step in the development of any projectile design. Of particular interest is the determination of the aerodynamic coefficients at transonic speeds. It is in this speed regime that the critical aerodynamic behavior occurs and a rapid change in the aerodynamic coefficients is observed. Two-dimensional, transonic, flow field computations over projectiles have been made using Euler equations which were used for solution with no special treatment required. In this work a solution algorithm is based on finite difference MacCormack’s technique for solving mixed subsonic-supersonic flow problem. Details of the asymmetrically located shock waves on the projectiles hav

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
Cognitive dimensions For grammar work at Sibweh In light of the data of the speech
...Show More Authors

The Arabic grammatical theory is characterized by the characteristics that distinguish it from other languages. It is based on the following equation: In its entirety a homogeneous linguistic system that blends with the social nature of the Arab, his beliefs, and his culture.
    This means that this theory was born naturally, after the labor of maintaining an integrated inheritance, starting with its legal text (the Koran), and ends with its features of multiple attributes.
Saber was carrying the founding crucible of that theory, which takes over from his teacher, Hebron, to be built on what it has reached. It is redundant to point to his location and the status of his book.
So came to my research tagged: (c

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 30 2023
Journal Name
College Of Islamic Sciences
The speech of the "Al Qeyam Al Fatimy " in the requirements of the generalized sayings
...Show More Authors

Abstract

The space occupied by the dialogic imperative in the language is a very wide range, as it is present in most of the speeches received by the recipient, and this is not limited to dialogues. That the literary discourse is a dialogical and fulfillment imperative, as the implication is related to the implicit connotations, as if the implication covers the indirect actions of the speech act theory.

View Publication Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
في تعزيز بيئة الانتاج الرشيق استخدام اسلوب S -5
...Show More Authors

في تعزيز بيئة الانتاج الرشيق استخدام اسلوب S -5

View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Italian Journal Of Pure And Applied Mathematics
A note on s-acts and bounded linear operators
...Show More Authors

Scopus (1)
Scopus
Publication Date
Sat Jan 01 2022
Journal Name
3rd International Scientific Conference Of Alkafeel University (iscku 2021)
Investigations for the critical vehicle velocities on a curved path
...Show More Authors

􀀨􀀅􀀆􀀔􀀜􀀄􀀂􀀆􀀈􀀓􀀌􀀩􀀏􀀆􀀉􀀅􀀆􀀉􀀅􀀉􀀚􀀝􀀔􀀄􀀗􀀉􀀚􀀆􀀂􀀓􀀚􀀁􀀔􀀄􀀓􀀅􀀆􀀄􀀂􀀆􀀔􀀓􀀆􀀃􀀂􀀔􀀄􀀟􀀉􀀔􀀃􀀆􀀔􀀜􀀃􀀆􀀛􀀃􀀜􀀄􀀗􀀚􀀃􀀆􀀗􀀌􀀄􀀔􀀄􀀗􀀉􀀚􀀆􀀂􀀘􀀃􀀃􀀊􀀂􀀆􀀓􀀖􀀆􀀓􀀛􀀃􀀌􀀔􀀁􀀌􀀅􀀄􀀅􀀕􀀢􀀆􀀪􀀜􀀃􀀆􀀄􀀅􀀛􀀃􀀂􀀔􀀄􀀕􀀉􀀔􀀄􀀓􀀅􀀂􀀆 􀀉􀀌􀀃􀀆􀀙􀀉􀀂􀀃􀀊􀀆􀀓􀀅􀀆􀀉􀀁􀀔􀀓􀀟􀀓􀀙􀀄􀀚􀀃􀀆􀀚􀀉􀀔􀀃􀀌􀀉􀀚􀀆􀀂􀀘􀀉􀀗􀀃􀀆􀀟􀀄􀀊􀀂􀀔􀀆􀀔􀀜􀀃􀀆􀀗􀀃􀀅􀀔􀀃􀀌􀀚􀀄􀀅􀀃􀀂􀀆􀀓􀀖􀀆􀀔􀀜􀀃􀀆􀀙􀀉􀀂􀀃􀀆

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref