Preferred Language
Articles
/
jcoeduw-1184
The Referential Aspect of the Quranic Text Az-Zahraa’s)Peace Be Upon Her( Speech
...Show More Authors

In the present paper, the researcher attempts to shed some light on the objective behind inserting some Qur'anic verses by Al-Zahraa (Peace Be Upon Her) in her revered speech. Besides, it tries to investigate the hidden meaning of these verses and to study them in the light of pragmaticreferences. This task is supported by Books of Tafseer as well as the books that explained this speech to arrive at its intended meaning. It is possible say that this is astep towards studying speeches of 'Ahlul Bayt' (People of the Prophet's household) in terms of modern linguistic studies, as well as employing modern methods to explore the aesthetic values of these texts.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 11 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Determination of the Impact of Electronic Health Information Systems upon Medical, Medical Backing and Administrative Decisions in Al-Kindy Teaching Hospital
...Show More Authors

Objective(s): To determine the impact of the electronic Health Information Systems upon medical, medical Backing and administrativedecisions in Al-Kindy Teaching Hospital. Methodology: A descriptive analytical design is employed through the period of June 14th 2015 to August 15th 2015. A purposive "non- probability" sample of (50) subject is selected. The sample is comprised of (25) medical and medical backing staff and (25) administrative staff who are all involved in the process of decision making in Al-Kindy Teaching Hospital. A self-report questionnaire, of (68) item, is adopted and developed for the purpo

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
The First National Conference On New Perspectives In Interpreting And Translation Studies And Teaching English As A Foreign Language
Promoting Peace by Althusserian and Foucauldian Reading ofLiterature: Sinan Antoon’s I’jaam
...Show More Authors

This study seeks to investigate Sinan Antoon’s I’jaam (2004) through applying different theoretical frameworks including those of Althusser (1971) and Foucault (1978). Antoon, considered as one of the most internationally recognized Iraqi writers, wrote this dystopian, war novel in Arabic and translated it to English. Antoon’s emphasis placed on literature acting as an oppositional political voice has, in turn, created its own form of censorship inside the fictional world and outside the actual state censorship during Saadm Hossein reign. Thus, particular political messages within literary texts, like I’jaam, have been received with critical attention. The writing culture in Iraq has established an atmosphere in which literary criti

... Show More
Publication Date
Mon Oct 20 2025
Journal Name
Научный форум
Strategies of cultural adaptation and linguistic russification in the muravyov-kistyakovsky translation of 'the fellowship of the ring' (1982): a comprehensive study of fantasy text domestication
...Show More Authors

This study examines strategies of cultural domestication in Muravyov and Kistyakovsky’s Russian translation of (The Fellowship of the Ring). It documents transformations of character names, toponyms, dialogues, and cultural references, highlighting systematic Russification and the infusion of Soviet political commentary that reshape the text into cultural rewriting.

View Publication Preview PDF
Publication Date
Wed Nov 06 2024
Journal Name
2024 17th International Conference On Development In Esystem Engineering (dese)
Speech Enhancement: A Review of Various Approaches, Trends, and challenges
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Theoretical And Applied Information Technology
Graph based text representation for document clustering
...Show More Authors

Advances in digital technology and the World Wide Web has led to the increase of digital documents that are used for various purposes such as publishing and digital library. This phenomenon raises awareness for the requirement of effective techniques that can help during the search and retrieval of text. One of the most needed tasks is clustering, which categorizes documents automatically into meaningful groups. Clustering is an important task in data mining and machine learning. The accuracy of clustering depends tightly on the selection of the text representation method. Traditional methods of text representation model documents as bags of words using term-frequency index document frequency (TFIDF). This method ignores the relationship an

... Show More
Preview PDF
Scopus (15)
Scopus
Publication Date
Tue Sep 28 2021
Journal Name
Journal Of The College Of Education For Women
Classism Hate Speech in Katherine Mansfield's Short Story ‘The Doll’s House’: A Pragmatic Study: ايمان نوري جاسم , مصلح شويش احمد
...Show More Authors

Hate speech (henceforth HS) has recently spread and become an important issue. This type of speech in children's writings has a particular formulation and specific objectives that the authors intend to convey. Thus, the study aims at examining qualitatively and quantitatively the classism HS and its pragmatic functions via identifying the speech acts used to express  classism HS, the implicature instigated as well as impoliteness. Since pragmatics is the study of language in context, which is greatly related to the situations and speaker’s intention, this study depends on pragmatic theoriespeech acts, impoliteness and conversational implicature) to analyze the data which are taken from Katherine Mansfield's short story (The D

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Mar 01 2004
Journal Name
Al-academy
اكتشافات النص الروائي واهميته في المعالجة والاخراج
...Show More Authors

اكتشافات النص الروائي واهميته في المعالجة والاخراج

View Publication Preview PDF
Publication Date
Wed Nov 28 2018
Journal Name
Arab Science Heritage Journal
المضامين الاقتصادية والعدل الاجتماعي في عهد الإمام علي (ع) إلى مالك الاشتر
...Show More Authors

       This paper discusses an important part of the  doctrine documented by AL Imam Ali (God peace him) to the prince of Egypt “Malik al Ashter” Which charactrised by universality Where it comprised all of what the administ-rative facilities need of the responsibilities to handle the society issues and problems to have a fair society .  

View Publication Preview PDF
Publication Date
Fri Sep 15 2017
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Graph-Based Text Representation: A Survey of Current Approaches
...Show More Authors

View Publication
Crossref (3)
Crossref