Preferred Language
Articles
/
jcoeduw-1137
Structuralism and the Problem of Text
...Show More Authors

All modern critical approaches attempt to cover the meanings and overtones of the text, claiming that they are better than others in the analysis and attainment of the intended meanings of the text. The structural approach claims to be able to do so more than any other modern critical approach, as it claimed that it is possible to separate what is read from the reader, on the presumed belief that it is possible to read the text with a zero-memory. However, the studies in criticism of criticism state that each of these approaches is successful in dealing with the text in one or more aspects while failing in one or more aspects. Consequently, the criticism whether the approach possesses the text, or that the text rejects this possession, remains in search for its completion in different approaches. Therefore, the rivalry between modern critical approaches remained in order to avoid incomplete coverage of the text. But, can the complete coverage of the text be achieved?

This question remains, in its essence, a philosophical one. Therefore, can we find an objective answer for it?

Keywords: Structuralism, Text, Critical approaches, Structural approach

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of The College Of Education For Women
THE PROBLEM RELATED TO WORKING IN KINDERGARTEN FROM THE POINT OF VIEW OF TEACHERS
...Show More Authors

           kindergarten teacher is one of the fundamental pillars upon which the kindergarten environment so that exposure to a number of problems that could affect its functioning in addition to any deficiencies in this environment leads to deprive a child of some activities and acquisition of concepts so the researcher studying the problems of working in kindergartens from the perspective of the parameters, so the researcher based measuring instrument for labour problems of (30) search sample was paragraph (50) parameter that was chosen at random and have been extracted Sincerity and strength tool researcher used statistical methods and discriminatory (Pearson correlation coefficient, t

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 27 2024
Journal Name
Al–bahith Al–a'alami
The problem of defining the vocabulary of teaching Arabic language methodology in media colleges
...Show More Authors

This study examined the problem of identifying the vocabulary of the methodology of teaching Arabic language in the faculties of Media. The researcher noticed the existence of an overlap between the syllabuses of the general specialization of the Arabic language and its Media sections in the universities with the special professional vocabulary that suits the study of the media student. Thus ,this study is regarded as a real attempt to present a methodological model of media language that concerns with fillfuling students ‘linguistic and knowledgeable needs relying on measuring their benefits from the methodological Arabic curriculum .  Key words:problem,  teaching’ methodology of Arabic language, media language.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of estimation methods for regression model parametersIn the case of the problem of linear multiplicity and abnormal values
...Show More Authors

 A simulation study is used to examine the robustness of some estimators on a multiple linear regression model with problems of multicollinearity and non-normal errors, the Ordinary least Squares (LS) ,Ridge Regression, Ridge Least Absolute Value (RLAV), Weighted Ridge (WRID), MM and a robust ridge regression estimator MM estimator, which denoted as RMM this is the modification of the Ridge regression by incorporating robust MM estimator . finialy, we show that RMM is the best among the other estimators

View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding text in gray image using mapping technique
...Show More Authors

Publication Date
Sat Nov 02 2019
Journal Name
Advances In Intelligent Systems And Computing
Spin-Image Descriptors for Text-Independent Speaker Recognition
...Show More Authors

Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
American Standard Code for Information Interchange mapping technique for text hiding in the RGB and gray images
...Show More Authors

Publication Date
Mon Apr 19 2021
Journal Name
Turkish Journal Of Computer And Mathematics Education (turcomat)
The Impact Of Innovative Matrix Strategy And The Problem Tree Strategy On The Mathematical Proficiency Of Intermediate Grade Female Students
...Show More Authors

The research aims to know the impact of the innovative matrix strategy and the problem tree strategy in teaching mathematics to intermediate grade female students on mathematical proficiency. To achieve the research objectives, an experimental approach and a quasi-experimental design were used for two equivalent experimental groups. The first is studied according to the innovative matrix strategy, the second group is studied according to the problem tree strategy. The research sample consisted of (32) female students of the first intermediate grade, who were intentionally chosen after ensuring their equivalence, taking into several factors, most notably (chronological age, previous achievement, and intelligence test). The research tools con

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 15 2020
Journal Name
Al-academy
Features of Absence in the Text of the Play Rubbish by Ali Abdunnabi Az-Zaidi: سرمد ياسين محمود-قصي عبد العباس راضي
...Show More Authors

In this research, we tackled the idea of absence and what companies it of interpretations and human, textual, philosophical and explanatory concerns. We also tackled the features and drawing them and identifying and lighting them by Ali Abdunnabi Az-Zaidi and how he read them as an Iraqi who writes in order to express a social, intellectual, political and religious reality in some of its aspects. The idea of absence and what accompanies it of pain or heartbreak or human change was a rich subject for all the writers and authors in the Iraqi theatre, and Ali Abdunnabi Az-Zaidi was one of them and the closest and most affected by it, who deserves discussion, explanation and briefing. The research problem was looking for the nature of absenc

... Show More
View Publication Preview PDF
Crossref