Preferred Language
Articles
/
URcjzY4BVTCNdQwC7Vhl
أسطرة الواقع في رواية ( صهيل النهر) للروائية السودانية بثينة خضر مكي

Abstract The myth is a story that is passed on to the generations generation after generation, ridiculed by literary writers in their literary work; to convey an important idea to the recipient, and in legend many things useful to the creator, especially the novelist, from that ritual and harnesses to be symbols that reach the recipient what the creator thinks; The Arabic novel, I chose Sahel al-Nahr's novel of Sudanese novelist Buthaina Khader Makki, a well-known author in her country for her advocacy of women and their rights. She used legend and mythic symbols in a deliberate manner to convince the recipient that what he read was a real thing worth standing at Understand E, has reached a number of results, including Buthaina Khader Makki has made reality a myth and legend. : The novelist Buthaina Khodr Mekki narrated her story on the myth that was equivalent to the idea of differences between women and men, no matter how much she was a follower. The novelist resorted to the myth to try to give a convincing explanation for the strangeness of the reality presented in her life affected by it, and affected it; to have an eye different from the eye of others. The novel identified aspects of the use of myth in the novel are: Escape from the strength and pressure of current problems. And the explosion of literary connotations and transmitted to the mind of the recipient, to match the culture of the recipient and his knowledge of things, myth is a method of thrill. The myth was the idea of the novel and its characters; it was a collection of symbols and rituals that illustrated the message that the novelist wanted to convey. Finally, I hope that I have succeeded in trying to deliver an idea of Sudanese literature rich in creativity, thought and serious work to the recipients, perhaps to draw the attention of researchers to study more and more to explore the treasures.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
The Evaluation of Accuracy Performance in an Enhanced Embedded Feature Selection for Unstructured Text Classification

Text documents are unstructured and high dimensional. Effective feature selection is required to select the most important and significant feature from the sparse feature space. Thus, this paper proposed an embedded feature selection technique based on Term Frequency-Inverse Document Frequency (TF-IDF) and Support Vector Machine-Recursive Feature Elimination (SVM-RFE) for unstructured and high dimensional text classificationhis technique has the ability to measure the feature’s importance in a high-dimensional text document. In addition, it aims to increase the efficiency of the feature selection. Hence, obtaining a promising text classification accuracy. TF-IDF act as a filter approach which measures features importance of the te

... Show More
Scopus (8)
Crossref (7)
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
The Role of Informativity in Translating Poetry (A Case Study of Emily Dickinson's Slant of Light)

Informativity, being an essential component of text/discourse, plays a significant role in highlighting the intended meaning and finally contributes to the overall process of rendering a text cross-culturally. It has, however, been overlooked by translators in doing their jobs. In poetic translation, informativity plays a particularly significant role as it sheds light on the ungraspable traits of meaning.

This study tries to explore this aspect in a translation of Emily Dickenson's Slant of Lights to see where the translator fell short in this aspect with attempts to produce an alternative translation taking into consideration the various orders of informativity. For this purpose, a model of informativity is forwarded t

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 15 2020
Journal Name
Al-academy
Features of Absence in the Text of the Play Rubbish by Ali Abdunnabi Az-Zaidi: سرمد ياسين محمود-قصي عبد العباس راضي

In this research, we tackled the idea of absence and what companies it of interpretations and human, textual, philosophical and explanatory concerns. We also tackled the features and drawing them and identifying and lighting them by Ali Abdunnabi Az-Zaidi and how he read them as an Iraqi who writes in order to express a social, intellectual, political and religious reality in some of its aspects. The idea of absence and what accompanies it of pain or heartbreak or human change was a rich subject for all the writers and authors in the Iraqi theatre, and Ali Abdunnabi Az-Zaidi was one of them and the closest and most affected by it, who deserves discussion, explanation and briefing. The research problem was looking for the nature of absenc

... Show More
Crossref
View Publication Preview PDF
Publication Date
Fri Oct 02 2015
Journal Name
American Journal Of Applied Sciences
Advances in Document Clustering with Evolutionary-Based Algorithms

Document clustering is the process of organizing a particular electronic corpus of documents into subgroups of similar text features. Formerly, a number of conventional algorithms had been applied to perform document clustering. There are current endeavors to enhance clustering performance by employing evolutionary algorithms. Thus, such endeavors became an emerging topic gaining more attention in recent years. The aim of this paper is to present an up-to-date and self-contained review fully devoted to document clustering via evolutionary algorithms. It firstly provides a comprehensive inspection to the document clustering model revealing its various components with its related concepts. Then it shows and analyzes the principle research wor

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
View Publication
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of The College Of Education For Women
The Prophetic Speeches (Hadith) on Sciences and Scientists: Application of the "Text from Text and D+" Theory

This study aims to apply the theory of "Text from Text and the Plus Dimension" in the analysis of the Prophetic discourse found in the section on the virtues of knowledge and scholars from Imam Sahih al-Bukhari's book. This section covers several topics, including the virtue of gathering for the sake of learning, the superiority of a scholar over a worshipper, the excellence of jurisprudence in the religion of Allah, the acquisition of knowledge through the passing away of scholars, the merit of inviting people to Allah, the continuing benefit of beneficial knowledge after a scholar's demise, the warning against seeking knowledge for purposes other than Allah, and the Prophet seeking refuge from knowledge tha

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Fri Jul 01 2016
Journal Name
Al–bahith Al–a'alami
Semiotics of Sufi Texts- Poets of Al Qasr and Al-Asr journals as a Model

In a common language based on interpretation and diagnosis in the symbols and signs, the subject of Sufism and artistic semiotics is manifested in the construction and intensity of the reading of the text and the dismantling of its intellectual systems.
The emergence of Sufism in its religious features and the spiritual revelations related to the divine love of life in absolute reality, And images and language in a stream of intellectual and artistic unique and harmonious communicates with the subject of the themes of the Arab literature and its implications, but it is separated by a special entity signals and symbols related to the mysticism and worship.
    The unleashing of the imagination and the diagnosis,

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Wed Feb 16 2022
Journal Name
Iraqi Journal Of Science
Text Steganography Method Based On Modified Run Length Encoding

Data hiding (Steganography) is a method used for data security purpose and to protect the data during its transmission. Steganography is used to hide the communication between two parties by embedding a secret message inside another cover (audio, text, image or video). In this paper a new text Steganography method is proposed that based on a parser and the ASCII of non-printed characters to hide the secret information in the English cover text after coding the secret message and compression it using modified Run Length Encoding method (RLE). The proposed method achieved a high capacity ratio for Steganography (five times more than the cover text length) when compared with other methods, and provides a 1.0 transparency by depending on som

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
Специфика аргументации экспрессии в художественном тексте Characteristics of Intellectual Inference in the Expression in The Artistic Text

Аннотация

      В статье считается национально-культурная специфика и языковое изменчивость выражения заключений в художественном тексте. В настоящее время в изучении художественного текста существует множество взаимодополняющих подходов и концепций, которые способствуют лучшему пониманию его языковых и культурных аспектов. Художественный текст как «воспроизведение» и от

... Show More
View Publication Preview PDF