Abstract The myth is a story that is passed on to the generations generation after generation, ridiculed by literary writers in their literary work; to convey an important idea to the recipient, and in legend many things useful to the creator, especially the novelist, from that ritual and harnesses to be symbols that reach the recipient what the creator thinks; The Arabic novel, I chose Sahel al-Nahr's novel of Sudanese novelist Buthaina Khader Makki, a well-known author in her country for her advocacy of women and their rights. She used legend and mythic symbols in a deliberate manner to convince the recipient that what he read was a real thing worth standing at Understand E, has reached a number of results, including Buthaina Khader Makki has made reality a myth and legend. : The novelist Buthaina Khodr Mekki narrated her story on the myth that was equivalent to the idea of differences between women and men, no matter how much she was a follower. The novelist resorted to the myth to try to give a convincing explanation for the strangeness of the reality presented in her life affected by it, and affected it; to have an eye different from the eye of others. The novel identified aspects of the use of myth in the novel are: Escape from the strength and pressure of current problems. And the explosion of literary connotations and transmitted to the mind of the recipient, to match the culture of the recipient and his knowledge of things, myth is a method of thrill. The myth was the idea of the novel and its characters; it was a collection of symbols and rituals that illustrated the message that the novelist wanted to convey. Finally, I hope that I have succeeded in trying to deliver an idea of Sudanese literature rich in creativity, thought and serious work to the recipients, perhaps to draw the attention of researchers to study more and more to explore the treasures.
Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreThe present study aims to show the importance of ESL reading ability in acquiring English as a second language. The study involves 92 college students (males and females) from the Department of English at Nizwa College of Applied Sciences, Sultanate of Oman. They represent two groups, the foundation year students and the first year English majors. A number of tests were used to measure students’ overall proficiency in English as well as their reading ability (i.e., the ability to contribute to the main idea of the text, scanning, skimming, to derive word meanings from context, to use a dictionary to find meanings, definitions, to identify prefixes, antonyms and synonyms). Students’ ability to read was correlated to their proficiency
... Show MoreIn this paper we investigate the automatic recognition of emotion in text. We propose a new method for emotion recognition based on the PPM (PPM is short for Prediction by Partial Matching) character-based text compression scheme in order to recognize Ekman’s six basic emotions (Anger, Disgust, Fear, Happiness, Sadness, Surprise). Experimental results with three datasets show that the new method is very effective when compared with traditional word-based text classification methods. We have also found that our method works best if the sizes of text in all classes used for training are similar, and that performance significantly improves with increased data.
Cognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections.
Schema and text world theories are useful tools in cognitive stylistic stud
... Show MoreÖZET
Irak’ın osmanlıcada yazılan sayısız elyazmalar çeşitli illerinde bulunur. Bunlardan Irak’ın başkenti olan Bağdat’tır. Irak Ulusal Müzesi Bağdad’ın uygarlık yerlerindendir. Elyazması Evi müzenin en önemli bölümleri sayılır. Orada osmanlıcada yazılan çok değerli elyazmalar bulunur. Bu elyazmalarından birisini ( fotokopi ) elde edip üzerinde çalışılmaktadır. Eser Antoloji şeklinde yazılmış. Bu eserden Sadullah Pâşâ’nın On Dokuzuncu Asır Manzumesini seçip ele alınmaktadır.
İki sayıfa ve 25 sat
... Show MoreFeature selection (FS) constitutes a series of processes used to decide which relevant features/attributes to include and which irrelevant features to exclude for predictive modeling. It is a crucial task that aids machine learning classifiers in reducing error rates, computation time, overfitting, and improving classification accuracy. It has demonstrated its efficacy in myriads of domains, ranging from its use for text classification (TC), text mining, and image recognition. While there are many traditional FS methods, recent research efforts have been devoted to applying metaheuristic algorithms as FS techniques for the TC task. However, there are few literature reviews concerning TC. Therefore, a comprehensive overview was systematicall
... Show MoreAdvances in digital technology and the World Wide Web has led to the increase of digital documents that are used for various purposes such as publishing and digital library. This phenomenon raises awareness for the requirement of effective techniques that can help during the search and retrieval of text. One of the most needed tasks is clustering, which categorizes documents automatically into meaningful groups. Clustering is an important task in data mining and machine learning. The accuracy of clustering depends tightly on the selection of the text representation method. Traditional methods of text representation model documents as bags of words using term-frequency index document frequency (TFIDF). This method ignores the relationship an
... Show MoreIn the process of translating Qur’anic texts, there is an urgent need for interpretations of the Qur’anic text due to the presence of many incomprehensible Qur’anic verses or words because of our distance from the standard Arabic, language in which the Holy Qur’an was revealed, and the introduction of the foreign words into our language, in addition to the fact that many Qur’anic words are no longer used. All this prompted the need for the interpretation of the Qur'anic text, Therefore, it is necessary for the translator to resort to the books of interpretation if he intends to translate the Qur’an
Metaphor is one of the most important linguistic phenomena of the artistic text, as it is the expression of the author’s emotions and evaluations, the result of a deep inner transformation of the semantic words and visual means of reflecting the national culture of each people. This paper examines the concept of linguistic metaphors and analyzes its types in the Russian and Arabic linguistics, provides a comparative analysis of metaphors in Russian and Arabic — all this allows to conclude that metaphorization is characteris- tic of different parts of speech. In the Russian language stylistic differentiation of the metaphors expressed more than in Arabic, so translation of many “sty- listic” metaphors from Russian into Arabic due to
... Show MoreIn this study, we have created a new Arabic dataset annotated according to Ekman’s basic emotions (Anger, Disgust, Fear, Happiness, Sadness and Surprise). This dataset is composed from Facebook posts written in the Iraqi dialect. We evaluated the quality of this dataset using four external judges which resulted in an average inter-annotation agreement of 0.751. Then we explored six different supervised machine learning methods to test the new dataset. We used Weka standard classifiers ZeroR, J48, Naïve Bayes, Multinomial Naïve Bayes for Text, and SMO. We also used a further compression-based classifier called PPM not included in Weka. Our study reveals that the PPM classifier significantly outperforms other classifiers such as SVM and N
... Show More