This article discusses the function of semiotics in political discourse after the socio-political processes taking place in Iraq since 2003 and its role in the development of textual criticisms of some Iraqi politicians, analyzes the reasons for its functioning in the speech of politicians. The research is mainly focused on finding out to what extent political text studies draw on sign systems that can store and transmit information, the nature of its purpose and the use of available fields for the purpose to be achieved. The chief purpose of the study is to investigate and also clarify the symbols and signs appear within the framework of discursive Iraqi politicians, the nature of the symbols used, and the meanings that are included in the discourse in terms of structure, context, and form. Moreover, it has been attempted to define semiotic features in the texts of Iraqi politicians; and elicit structure, style and wording, and the degree of convergence of meaning and form in the semiotic application.
The current study is considered a field study to measure the level of satisfaction of the academic programs of Media Masters students. That was accomplished through surveying the attitudes of the students who are enrolled in the faculties of media at the following universities: (Petra University, The Middle East University (MEU), and Al-Yarmouk University). Those students were enrolled in the master’s program within the formal educational system during the second semester of the academic year (2015 – 2016). This survey aims to identify the services, facilities and academic programs provided by the concerned faculties. It, also, aims to identify the public relations, administrative, educational and services aspects of those faculties.
... Show MoreCognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections. Schema and text world theories are useful tools in cognitive stylistic studies. The reader's perception o
... Show MoreLanguage as a means of communication has long been the concern of many conversation analysts in their studies such as: Sacks et al. (1974), Schegloff et al. (1977), Duncan (1972), Grice (1975) and Burton (1980). Burton has attempted analyzing the first ten transitions of the play “The Dumb Waiter” for mere a presentation of her approach. This paper aims at analyzing the conversational structure of forum on the subject of literary fiction and genre fiction by applying Burton’s model (1980) of analysis to answer the question to what extent this model is applicable in analyzing the presented text. The findings of the investigation have proved the applicability of the structure of conversation formulated by Burton (1980) in her model wit
... Show MoreCognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections.
Schema and text world theories are useful tools in cognitive stylistic stud
... Show MoreThe current research aims to shed light on the Global Reporting Initiative (GRI), which helps to report financial and non-financial information by economic units in general and listed on the Iraq Stock Exchange in particular. The research was based on a main premise that apply the criteria of the Global Reporting Initiative (GRI) would provide useful information to users to help them make appropriate decisions. To achieve the goal of the research, the descriptive analysis method was used, and quantitative analysis was used. At the level of the descriptive analysis method, a desk survey was conducted. As for the quantitative analysis, it relied on applied data through a questionnaire form (Questioners) as a research tool, and the
... Show Moreيسعى البحث إلى الاهتمام بإحدى الوظائف المهمة في إدارة الموارد البشرية وهي تقويم الأداء التي تواجه مجموعة من الانتقادات والآراء السلبية، اذ ظهر في الأّونة الأخيرة أنموذج جديد يمكن إن يتجاوز تلك السلبيات وهو أنموذج التغذية العكسية المتعدد المصادر درجة .وقد حاول الباحثان توظيف هذا المفهوم في اثنتين من المنظمات العامة العراقية هما (دائرة كهرباء الوسط) التابعة لوزارة الكهرباء
و (دائرة الماء والمجاري) ال
Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha
... Show MoreThe technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show More