Preferred Language
Articles
/
bsj-1024
Magic square
...Show More Authors

In this paper we introduce two Algorithms, the first Algorithms when it is odd order and how we calculate magic square and rotation for it. The second Algorithms when it be even order and how to find magic square and rotation for it.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 28 2021
Journal Name
Journal Of The College Of Education For Women
Classism Hate Speech in Katherine Mansfield's Short Story ‘The Doll’s House’: A Pragmatic Study: ايمان نوري جاسم , مصلح شويش احمد
...Show More Authors

Hate speech (henceforth HS) has recently spread and become an important issue. This type of speech in children's writings has a particular formulation and specific objectives that the authors intend to convey. Thus, the study aims at examining qualitatively and quantitatively the classism HS and its pragmatic functions via identifying the speech acts used to express  classism HS, the implicature instigated as well as impoliteness. Since pragmatics is the study of language in context, which is greatly related to the situations and speaker’s intention, this study depends on pragmatic theoriespeech acts, impoliteness and conversational implicature) to analyze the data which are taken from Katherine Mansfield's short story (The D

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Educational And Psychological Researches
Analysis of computer textbooks content for intermediate stage according to the theory of multiple intelligence
...Show More Authors

The purpose of current study is to analyze the computer textbooks content for intermediate stage in Iraq according to the theory of multiple intelligence. By answering the following question “what is the percentage of availability of multiple intelligence in the content of the computer textbooks on intermediate stage (grade I, II) for the academic year (2017-2018)? The researcher followed the descriptive analytical research approach (content analysis), and adopted an explicit idea for registration. The research tool was prepared according the Gardner’s classification of multiple intelligence. It has proven validity and reliability. The study found the percentage of multiple intelligence in the content of computer textbooks for the in

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 31 2020
Journal Name
Political Sciences Journal
Constructivism Theory in International Relations (Case Study on the War on Terrorism)
...Show More Authors

        The topic of the research revolves around constructivist theory, which is one of the most important theories that added weight to the theoretical and epistemological field of international relations. The constructivist theory studies international relations from a completely different side of theories by focusing on the social aspects of international relations, and by looking at international relations as social constructs. Ideas, cultures, norms, standards and language play a major role in their formation. The study also examines the state of the war on terrorism as it represents one of the most international cases in which its composition and composition coincide with constructive ideas and a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 18 2021
Journal Name
International Journal Of Emerging Technologies In Learning (ijet)
The Effectiveness of Educational Pillars Based on Vygotsky's Theory in Achievement and Information Processing Among First Intermediate Class Students
...Show More Authors

The aim of the research is to identify the effectiveness of the educational pillars strategy based on Vygotsky's theory in mathematical achievement and information processing of first-grade intermediate students. In pursuit of the research objectives, the experimental method was used, and the quasi-experimental design was used for two equivalent groups, one control group taught traditionally and the other experi-mental taught according to the educational pillars strategy. The research sample consisted of (66) female students from the first intermediate grade, who were inten-tionally chosen after ensuring their equivalence, taking into account several factors, most notably chronological age and their level of mathematics, and they we

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Journal Of The College Of Education For Women
Bestiality and the Deconstruction of Family Cohesion in Edward Albee's The Goat or, Who Is Sylvia?
...Show More Authors

Edward Albee (1928-2016) is an American  dramatist who is notorious for his controversial works. Albee's plays generate a crisis of a restraint situation and a point of no return where characters trespass the limits and get caught up in a tragic cycle. The Goat or Who is Sylvia? )2000) is one of his controversial pieces, addressing (human-animal relations). This theatrical masterpiece unleashes man's wildest desires and ravaging behavior. Bestiality is a criminal offense placed in the domain of mental disorders attributed to the lack of emotional support, anxiety, depression, and psychological problems. It is also a serious moral infraction of communities' socio-religious traditions. In this play, Martin’s bestiality lead

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Analytical Solutions for Advanced Functional Differential Equations with Discontinuous Forcing Terms and Studying Their Dynamical Properties
...Show More Authors

This paper aims to find new analytical closed-forms to the  solutions of the nonhomogeneous functional differential equations of the nth order with finite and constants delays and various initial delay conditions in terms of elementary functions using Laplace transform method. As well as, the definition of dynamical systems for ordinary differential equations is used to introduce the definition of dynamical systems for delay differential equations which contain multiple delays with a discussion of their dynamical properties: The exponential stability and strong stability

View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun Jan 20 2002
Journal Name
Journal Of The College Of Languages (jcl)
Domestic Animals in English and Iraqi Rural Proverbs: A Pragmastylistic Study
...Show More Authors

Proverbs gain their importance not only from the fact that they represent a cultural record of the people of every nation, but they reveal the way they use language and how they exploit their environments as a good source of inspiration to enrich that language.  Domestic animals, as part of every environment, play a major role in composing proverbs in every nation.

       This study is an attempt to pragmastylistically analyse some selected English and Iraqi rural proverbs using domestic animals in their texts. It limits itself to investigate certain stylistic and pragmatic devices such as: the type of sentences, their lengths, their content and grammatical words, the part of speech used, metaph

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Tadpole Domination in Graphs
...Show More Authors

A new type of the connected domination parameters called tadpole domination number of a graph is introduced. Tadpole domination number for some standard graphs is determined, and some bounds for this number are obtained. Additionally, a new graph, finite, simple, undirected and connected, is introduced named weaver graph. Tadpole domination is calculated for this graph with other families of graphs.

View Publication Preview PDF
Scopus (29)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Mar 04 2023
Journal Name
Baghdad Science Journal
Exploration of CPCD number for power graph
...Show More Authors

Recently, complementary perfect corona domination in graphs was introduced. A dominating set S of a graph G is said to be a complementary perfect corona dominating set (CPCD – set) if each vertex in  is either a pendent vertex or a support vertex and  has a perfect matching. The minimum cardinality of a complementary perfect corona dominating set is called the complementary perfect corona domination number and is denoted by . In this paper, our parameter hasbeen discussed for power graphs of path and cycle.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref