Preferred Language
Articles
/
jcoeduw-1005
An Introduction to Gender in Feminine Literature and Criticism
...Show More Authors

The Gender study is consider one of the concepts which the Postmodernism reached
after the end of Modernism, where the first one has limited the criticism study choices before
the second after closed many doors of subjects which was enriched by researches.
It is pretty clear that the root of this concept belongs to the Linguistics which provided
the Criticism with a countable reasons of it is growth.
The attention in the study of gender in Feminine Literature and Criticism increased in
Arabic studies since the early years of twenty one century, so this research is presented to be
an introduction to this subject which could pave the way to more studies.
In addition to the Gender studies this research deals with another concept which
received a considerable attention from the Arabic Criticism, it is the Feminist Criticism,
whether it was affiliated to the literary or cultural criticism.
In the first Part, the research tries to present the gender term in it is lingual aspect ,
following the criterion which the bilateral Man/Woman was built according to, and refer to
one of Julia Cristivas novels, while the second part identify the feminist criticism and
following up this theory.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 30 2019
Journal Name
لارك
Approaches to Lexicography in English and Arabic
...Show More Authors

Lexicography, the art and craft of dictionary-making, is as old as writing. Since its very early stages several thousands of years ago, it has helped to serve basically the every-day needs of written communication among individuals in communities speaking different languages or different varieties of the same language. Two general approaches are distinguished in the craft of dictionary-making: the semasiological and the onomasiological. The former is represented by usually-alphabetical dictionaries as such, i.e. their being inventories of the lexicon, while the latter is manifested in thesauruses. English and Arabic have made use of both approaches in the preparation of their dictionaries, each having a distinct aim ahead. Wit

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 30 2021
Journal Name
College Of Islamic Sciences
The Trilogy of Punishment - The Great, Painful and Humiliating in the Holy Quran An objective study: The Trilogy of Punishment - The Great, Painful and Humiliating in the Holy Quran An objective study
...Show More Authors

The study of triples seeks to deal with the comprehensive nature of the Qur’an texts, and the choice fell on the trilogy of great torment, pain, and humiliation in the Noble Qur’an - an objective study, the title of this research, in which I tried to shed light on these terms, and the nuances between them, and in particular torment The eschatological terminology varied, which can be summed up in three terms, namely the great, the painful, and the offensive. The types of torment, the pain is the painful one that is described by the severity of pain and its horror, as for the humiliating punishment, it is that which humiliates the one who has fallen on it, and the diversity of torment is due to the diversity of sins.

View Publication Preview PDF
Publication Date
Sun Oct 06 2024
Journal Name
International Journal Of Advances In Engineering And Management (ijaem)
The makers of sedition in light of Chapters (Al-Baqarah and Yusuf)/An objective study
...Show More Authors

The makers of strife exist in every era and time. They differ in how these temptations are created and the methods used in doing so. In our modern era, they are more; This is due to the presence of information technology and its easy availability at their fingertips, as well as the spread of social networking sites, which are rapidly spreading among ignorant groups and groups that are deficient in their use. Which led the makers of sedition to exploit these matters and create various temptations and spread them among peoples and societies. Today, we cannot predict the future of humanity in light of this huge amount of temptation. What the Holy Qur’an mentioned about the types of temptations in its noble verses and their embodiment in seve

... Show More
Preview PDF
Publication Date
Mon Mar 13 2017
Journal Name
Journal Of Baghdad College Of Dentistry
A study to compare the internal fitness and marginal gap between single crowns and crowns within three-unite bridge of zirconia substructure fabricated by CAD-CAM system. (An In vitro study)
...Show More Authors

ABSTRACT Purpose: the aim of this in vitro study was to compare the marginal gap and internal fitness between single crowns and the crowns within three-unit bridges of zirconium fabricated by CAD-CAM system. Materials and methods: A standard model from ivoclar company was used as a pattern to simulate three-units bridge (upper first molar and upper first premolar) as abutments used to fabricate stone models, eight single crowns for premolar and eight of three units bridges. Crowns and bridges fabricated by CAD-CAM system were cemented on their respective stone models then sectioned at the mid-point buccolingaully and misiodistaly and examined under stereomicroscope. Result: the marginal gap in premolar crowns and premolar within bridge we

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Nov 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Evaluating Quality of Control Policies and Procedures for Banking Transactions Using the Non-application Gap Model to Enhance Financial Reporting Requirements Applied Study in an Iraqi Private Bank
...Show More Authors

The research aims to enhance the level of evaluation of the performance of banking transactions control policies and procedures. The research is based on the following hypothesis: efficient transactions control policies and procedures contribute enhancing financial reporting, by assessing non-application gap of those policies and procedures in a manner that helps to prevent, discover, and correct material misstatementsThe researchers designed an examination list that includes the control policies and procedures related to the transactions, as a guide to the bank audit program prepared by the Federal Financial Supervision Bureau. The research methodology is

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jan 02 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Effects of three different types of intracoronal bleaching agents on shear bond strength of stainless steel and sapphire brackets bonded to endodontically treated teeth (An in vitro study)
...Show More Authors

Background: evaluate the effects of three different intracoronal bleaching agents on the shear bond strengths (SBS) and failure site of stainless steel and monocrystalline (sapphire) orthodontic brackets bonded to endodontically treated teeth using light cured orthodontic adhesive in vitro. Materials and methods: Eighty extracted sound human upper first premolars were selected, endondontically treated and randomly divided equally (according to the type of the brackets used) into two main groups (n = 40 per group). Each main group were subdivided (according to the bleaching agent used) into four subgroups 10 teeth each; as following : control (un bleached) group, hydrogen peroxide group (Hp) 35%, carbamide peroxide group (CP) 37% group and s

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Evaluating the supervision tools of the Central Bank of Iraq to verify the continuity of private banks: An applied research in the Central Bank of Iraq
...Show More Authors

The aim of the research to highlight the calendar of the most important tools used by the Central Bank of Iraq, in the implementation of the function of supervisory oversight, to verify the stability of the banking system, and protect the funds of shareholders, and depositors in general and the absence of any raises the risks of default and financial failure in particular, for commercial banks. The most important flaws and weaknesses in these tools, in the early detection of the risks of continuity in a timely manner, The study concluded a set of conclusions, including the weakness of the tools used in the performance of the function of supervisory oversight in detecting cases of default and financial failure in the early time as well as

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 30 2013
Journal Name
College Of Islamic Sciences
The Leader: His Qualifications and Attributes in the Quranic Perspective in Light of Surat Al-Naml - An Objective Study
...Show More Authors

Praise be to God, prayer and peace be upon the Messenger of Allah and after :
For the Holy Qur’an is the constitution of this nation, and it has included everything that the nation needs, and it has appropriate solutions for all the problems it faces, and for a long time the nation has its vision for the future, waiting for a leader who carries the concerns of this nation and proceeds towards progress and progress, so that it rises to the glory and glory. He brings it out from what it is today, from its deterioration in all levels.
The world has witnessed in recent decades the development of programs and curricula, and books have been prepared showing how to prepare leaders and their industry, and what programs they should adopt

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 30 2024
Journal Name
مجلة كلية اللغة العربية بأسيوط
Shades of meanings of letters in Arabic (Some double and triple letters are an example)
...Show More Authors

Meaning letters in Arabic are characterized by the diversity and abundance of their linguistic material, and are also distinguished by their large number and types, to the point that some of them have reached a hundred letters confined to five categories

View Publication Preview PDF