Preferred Language
Articles
/
abaa-137
From Structure to the Signal (Text and Discourse in the Semiotic Analysis)
...Show More Authors

Care and attention to the structure in the sixties of the last century replaced the mark, and if the structure of Ms. pampered in research and studies, it has become the mark is also a spoiled lady .. But the relationship between the structure and the mark was not a break and break, but the relationship of integration, His themes are structural analysis, and these are intellectual themes that can not be surpassed in contemporary research, especially since semiotics have emerged from the linguistic inflection.

We have tried to distinguish between text and speech, which is a daunting task, as it seems that whenever the difference between them is clear and clear, we come back to wonder whether the text is the same discourse, and is the speech a set of texts? If so, why should some researchers unite the two terms? ?

We have worked as much as we can to try to distinguish between them, using the opinions and theses in this important intellectual polemics, as reaching a clear definition of each of them will be useful in reading the narrative, poetic, and informational motto.

We have, of course, used the semiotic approach in analysis, since this research contained two or two parts. The first is a theoretical approach to the analysis method and the second is a practical one. It is related to the analysis of a short historical text, By the Canadian critic Nothrop Frey in expanding the concept of narrative, not limited to specific texts or literary sex, as did the American critic Henry James before. His theory in the narratives became a doctrinal dogma, in particular the definition of conditions or the transfer of arguments that must be followed by the narrator.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
الأستاذ
Analysis of the content of the chemistry book for the second intermediate grade according to habits of mind In light of the educational reform project (2061)
...Show More Authors

Preview PDF
Publication Date
Fri Jun 20 2025
Journal Name
Basic Education College Magazine For Educational And Humanities Sciences
Developing the design structure of Iraqi children magazine covers
...Show More Authors

View Publication
Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
Study the structure of Hg1-x Cdx Te alloy
...Show More Authors

A study carried out to prepare Hg1-xCdxTe compound and to see the effect on increasing the percentage of x on the compound structure by using x-ray diffraction and atomic absorption for 0

View Publication Preview PDF
Crossref
Publication Date
Sun Oct 03 2021
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
Analysing the structure of A4-graphs for Mathieu groups
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Thu Nov 21 2019
Journal Name
Journal Of Engineering
Comparative Permeability Estimation Method and Identification of Rock Types using Cluster Analysis from Well Logs and Core Analysis Data in Tertiary Carbonate Reservoir-Khabaz Oil Field
...Show More Authors

Characterization of the heterogonous reservoir is complex representation and evaluation of petrophysical properties and application of the relationships between porosity-permeability within the framework of hydraulic flow units is used to estimate permeability in un-cored wells. Techniques of flow unit or hydraulic flow unit (HFU) divided the reservoir into zones laterally and vertically which can be managed and control fluid flow within flow unit and considerably is entirely different with other flow units through reservoir. Each flow unit can be distinguished by applying the relationships of flow zone indicator (FZI) method. Supporting the relationship between porosity and permeability by using flow zone indictor is ca

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Dec 29 2021
Journal Name
Journal Of The College Of Education For Women
Impact of Electronic Games on the Increase of School Dropout among Students in the Basic Stage in Jordan from their teachers’ Perspective
...Show More Authors

The study aims to identify the impact of electronic games on increasing the dropout rate among students in the basic stage in Jordan from their teachers’ point of view. The study adopted a descriptive survey method. Its community consisted of all fe(male) teachers of the basic stage in public and private schools, (First Amman, Irbid, and special education in Zarqa and Amman). The electronic questionnaire was used as a tool for the study. The results have shown that the effect of electronic games on increasing the dropout rate among students in the basic stage in Jordan was high. Besides, there are statistically significant differences due to the gender variable for males. There are statistically significant differences due to the varia

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Requirements of stress tests model and the possibility to apply in Iraqi banks exploratory study of the views of a sample of staff in the central Bank of Iraq .
...Show More Authors

Abstract

This research attempt to explain the essential aspects of one important model in management of Bank risks , that is (stress testing) , which increase the concentrate on it resulting the negative affects of Global financial crisis that it accuar in 2008 to study the application possibilities in iraqian banks to enhancing the safety and financial soundness Becuase the classical tools  in Risk management don’t give clear image on Banks ability  in facing risks, hence the Basel committee on Banking supervision focusing in agreement of Basel 2,3 on stress testing when it doing the internal capital adequacy assessment process (ICAAP) .

To achieving the reseach obje

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 17 2023
Journal Name
College Of Islamic Sciences
Lessons learned from the personality of Salah al-Din al-Ayyubi and his policy
...Show More Authors

The personality of the hero Salah al-Din al-Ayyubi (may God have mercy on him) came from the womb of jihad after difficult travails that the Arab Islamic nation experienced through the jihad of its loyal and honest sons who vowed themselves to God in defense of his religion and law, so between 490 AH - 540 AH outstanding jihadi leaders emerged who took upon themselves the responsibility of jihad and mobilizing the nation's energies To fight its enemies - the Franks, the Crusaders - in the Levant, and those leaders succeeded in achieving impressive victories over the Frankish military effort and regained some cities that were usurped by the Franks. Balak bin Bahram, Suqman, and Jakarmish, but these leaders could not maintain a state of un

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
The Tribal Power in Contemporary Iraq: A Sociological Analysis
...Show More Authors

This is an empirical investigation of the tribal power in Iraq and its consequences on the socio-political system. A theoretical background concerning thestate kinship, tribe and tribal involvement in politics has been displayed with example of tribal power over people within the social context. Socio-anthropological method of data collection has been used, including a semi-structured interview with a sample of 120 correspondents. The outcome revealed that the feeble and corrupted state (government) play a vital role in encouraging the tribe to be dominant. The people of Iraq are clinging to the tribe regardless of whether they believe in it or not. Although they are aware that the tribe is a pre-state organisation and marred shape of ci

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More