Preferred Language
Articles
/
dxg2wJUBVTCNdQwCDn4l
Iraq Wars: From A literary text to Social Context
...Show More Authors

This article investigates Iraq wars presentation in literature and media. The first section investigates the case of the returnees from the war and their experience, their trauma and final presentation of that experience. The article also investigates how trauma and fear is depicted to create an optimized image and state of fear that could in turn show Iraqi society as a traumatized society. Critics such as Suzie Grogan believes that the concept of trauma could expand to influence societies rather than one individual after exposure to trauma of being involved in wars and different major conflicts. This is reflected in Iraq as a country that was subjected to six comprehensive conflicts in its recent history, i.e. less than half a century; these are the Iraq-Iran war, the first Gulf war, the economic sanctions, the second Gulf war 2003, the civil war, and the wars of liberation against ISIS. The second section investigates Franco Moretti's theory of the Dialectic of Fear and the implication of this hypothesis of stereotyping on the Iraq war and its transformation from an anomaly expressed issue in the media and creative texts to a social reality that is measured by presenting what is not acceptable as an acceptable pattern in the case of war and shock between Iraq and the wars that took place in the west, and the extent of its impact on the protraction of the state of social trauma suffered by Iraqis, who are still suffering under the effects of prolonged political conflicts even after the end of military field conflicts. The research sheds the light on studies such as the Dialectic of Fear by Franco Moretti, Risk Society by Ulrich Beck and Oh My God: Diaries of American Soldiers in Mesopotamia edited and translated by Buthaina AlNasiri.

Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
PHARAOH'S CHARACTER BETWEEN THE QUR'ANIC TEXT AND THE ARABIC NOVEL: (Naguib Mahfouz's Pharaonic Novels as a Model)
...Show More Authors

The Character is one of the elements of Storytelling, as it is the center of the plot, making it the basis on which the talk is about. The talk is the portrayal of the character while they’re acting; the novelist presents the character by interacting with the events, and the extent of the negative and positive appearing impact on the character. It should be noted that everyone has two personalities or more, each one appearing in a different position or situation. For instance, a man can be a father, a lover, an employee, a son or anyone else .. in another position, he might be a master, and in another a looser begging for the mercy of his humiliator, and sometimes he can show weakness to the one he loves, or show strength to his enemie

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
The role of social worker and service and social school
...Show More Authors

Concert place high school in the community Keep pace with societal change and what is going through Iraqi society from the wars and occupation and the sectarian and ethnic conflict and authoritarian policies and Dictator ship .
This is the circumstance of the most important historical stages that require .
Precision sons is Keep up with the progress and development and the advancement of the educational march .
The school is a social institution that organizes the members of society all walks of life and their habitats working on crafting members of the extraordinary alve of progress At the multiplicity of functions and tasks school pequires members qualified scientific and practical Becomes complementary members seek progress a

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 28 2021
Journal Name
Journal Of The College Of Education For Women
The Stories of Proverbs in the Holy Qur’an, Prophet’s Hadith, and Arabs’ Sayings: A Literary Study: مسلم عبيد فندي الرشيدي
...Show More Authors

The Arab realized that proverbs and their stories had a great literary and linguistic significance, accordingly, they collected them from their sources and wrote them down. Thus, researchers went in studying them in different directions. The aim of the present research is thus to study the stories of proverbs in the Holy Qur’an, Prophet’s hadiths, and in the sayings of Arabs. Such a study helps to show the extent of the relevance of their stories to the proverbs, their literary values, the points of convergence between them and what they highlight, and the extent of their proximity to reality. It further helps to determine the factors that contributed to the transformation of Quranic verses, Prophet’s hadiths, and some phrases of s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Educational And Psychological Researches
The social responsibility to the visual media and its role in spreading the culture of the environment protection / field research to a sample of students of the University of Baghdad
...Show More Authors

        This paper deals with social responsibility visible to the media and the role they play in spreading the culture of environmental protection, and make research on a sample of the University of Baghdad consisting students from 150 students, male and female were distributed questionnaire form on the sample to obtain the required information has been questionnaire included axes distributed questions achieve the objectives of the search, and after the form data were analyzed using statistical program spss results show that the visual media and its role in spreading the culture of environmental protection form averages arithmetic high, indicating a rise in the influence of th

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Mon Jan 08 2024
Journal Name
Al-academy
Medea Euripides between text and contemporary theatrical presentation
...Show More Authors

It is not available for us to go back in time and see plays old and it plays giants tragedy ancient Greek (Aeschylus, Sofokls, and yourbedes) through the eyes of a generation ago, and if we were able to go back to Ntegathm play it is certain that we will not taste or Nstassig for much of what we see from these offers will not afford the traditional religious rituals, which was accompanied also dance and music in the style of ancient Greek play was representing a large part of the theater see manifestations Can our eyes and ears we twentieth century audience to accept those appearances, and it was then?
Inevitably it will look like a museum bycollection not only. So we find ourselves in the light of the foregoing forced When you do rem

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 15 2022
Journal Name
Al-academy
The semiotic approach in analyzing contemporary graphic text
...Show More Authors

With a great diversity in the curriculum contemporary monetary and visions, and development that hit the graphic design field, it has become imperative for the workers in the contemporary design research and investigation in accordance with the intellectual treatises and methods of modern criticism, because the work design requires the designer and recipient both know the mechanics of tibographic text analysis in a heavy world of texts and images varied vocabulary and graphics, and designer on before anyone else manages the process of analysis to know what you offer others of shipments visual often of oriented intended from behind, what is meant, in the midst of this world, the curriculum Alsemiae directly overlap with such diverse offer

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Features of genetic algorithm for plain text encryption
...Show More Authors

The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process

... Show More
View Publication
Scopus (15)
Crossref (4)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref