Preferred Language
Articles
/
jcoeduw-1362
Schema Theory and Text- worlds: A Cognitive Stylistic Analysis of Selected Literary Texts
...Show More Authors

Cognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections.       

Schema and text world theories are useful tools in cognitive stylistic studies. The reader's perception of a particular text world depends on her/his existing schema during the process of interpretation. The selected texts for the study are "Strange Meeting" by Wilfred Owen, "In Winter" by Corbett Harrison and the opening passage of David Lodge's novel Changing Places which are intended to show how the two theories can be integrated to account for the way in which text worlds are perceived. So as a result, readers start establishing meaning based on their schemata and these meanings change through adding a new one. The cognitive ability to understand literary texts and how readers build mind worlds is a crucial aim in cognitive poetics. An in-depth cognitive stylistic analysis reveals significant points about reading and interpreting the selected literary texts by providing a way of thinking about background knowledge and how the individual's experience would influence their interpretation and viewing of the  text world.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 30 2014
Journal Name
College Of Islamic Sciences
Investigations in the sanctity of divine texts and their composition: (Comparative study between the Quran and the Torah)
...Show More Authors

The research deals with an important issue that many people are working on, namely the sanctification of the texts on which the timings of the time and the different conditions of the place took place. Do not live up to the ranks of perfection and perfection, and every effort has explanations according to the mind machine, which is not protected by infallibility from error. The great downfall is to put these intellectual efforts in the Bible without separating them from the Word of God. The situation and the place on the adherents of a religion and mixed with the trick of the average individual only to be subject to the words of the teachers of Sharia and docility.

View Publication Preview PDF
Publication Date
Sat Oct 11 2025
Journal Name
International Journal Of Data And Network Science
Multi-objective of wind-driven optimization as feature selection and clustering to enhance text clustering
...Show More Authors

Text Clustering consists of grouping objects of similar categories. The initial centroids influence operation of the system with the potential to become trapped in local optima. The second issue pertains to the impact of a huge number of features on the determination of optimal initial centroids. The problem of dimensionality may be reduced by feature selection. Therefore, Wind Driven Optimization (WDO) was employed as Feature Selection to reduce the unimportant words from the text. In addition, the current study has integrated a novel clustering optimization technique called the WDO (Wasp Swarm Optimization) to effectively determine the most suitable initial centroids. The result showed the new meta-heuristic which is WDO was employed as t

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 30 2013
Journal Name
College Of Islamic Sciences
 Assignment method in the Holy Quran and some of its applications in Surat Al-Anaam
...Show More Authors

Research objective: This research aims to unveil how to use the method of referral in understanding the Holy Quran.
        The reason for choosing the research: The one that invited me to write on this topic is the importance of the referral method, so I liked the research in it, and unveiled this wonderful Qur’anic method, so that it helps to understand the intention of God Almighty in his dear book.
       The research plan: The research was divided into three topics and a conclusion.
   As for the first topic, it is divided into two requirements. The first requirement deals with the definition of referral language.
In the second re

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of the theoretical framework of the REA accounting model Used in the design of accounting information systems
...Show More Authors

Researchers often equate database accounting models in general and the Resources-Events-Agents (REA) accounting model in particular with events accounting as proposed by Sorter (1969). In fact, REA accounting, database accounting, and events accounting are very different. Because REA accounting has become a popular topic in AIS research, it is important to agree on exactly what is meant by certain ideas, both in concept and in historical origin. This article clarifies the analyzing framework of REA accounting model and highlights the differences between the terms events accounting, database accounting, semantically-modeled accounting, and REA accounting. It als

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Journal Of New Theory
Brief review of soft sets and its application in coding theory
...Show More Authors

In this paper, we will focus to one of the recent applications of PU-algebras in the coding theory, namely the construction of codes by soft sets PU-valued functions. First, we shall introduce the notion of soft sets PU-valued functions on PU-algebra and investigate some of its related properties.Moreover, the codes generated by a soft sets PU-valued function are constructed and several examples are given. Furthermore, example with graphs of binary block code constructed from a soft sets PU-valued function is constructed.

Publication Date
Thu Mar 10 2011
Journal Name
University Of Thi-qar Journal
Negative Capability: Theory and Practice in the Poetry of John Keats
...Show More Authors

View Publication Preview PDF
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
The concept of freedom in the texts of Yashar Kamal play "The play (The Plate) as a model": عامر صباح نوري المرزوك
...Show More Authors

This research is concerned with studying (the concept of freedom in the texts of Yaşar Kamal the play), as the Turkish playwright (Kamal Yasar) is one of the contemporary playwrights who have been interested in and criticize society, and perhaps the concept of freedom in his texts took a different form, through his ability to renew and present his attempts to create A theatrical form different from his earlier writers in dealing with the life of the peasants and the oppression that went through them, as the researcher identified the problem of his research with the following question: What is the concept of freedom in the texts of Yashar Kamal? The research aims to define the concept of freedom in the texts of Yashar Kamal of the play,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Heuristic Program proposal for the treatment of talented emotional and Cognitive problems
...Show More Authors

Heuristic Program proposal for the treatment of talented emotional and Cognitive problems .

1-The Curtent research aims : to identify the needs of gifted students and their problems and Ways to diagnose .

2-reprepare aproposal heuristic program for the treatment of emotional and Cognitive talented problems .

Research . Methodology : analytical and descriptive .

Define the terms

Virt uoso is the per for mance of the privileged Mstmrave performances appear in any area of his Values .

Chapter ll : Includes recipes gifted child and Methods diagnosis gifted by filtrontion and standavds of personal and mental and behavioral Doramwaliman and parental Features and Leader in the detection of the gif

... Show More
View Publication Preview PDF
Publication Date
Thu May 25 2023
Journal Name
Eureka: Physics And Engineering
Design, analysis and construction of a simple pulse duplicator system
...Show More Authors

One of the most important human diseases that need to be considered in terms of development of the medical engineering devices is cardiovascular disease which is a significant cause of death globally recently. Valvular heart disease is normally treated by restoring or altering heart valves with an artificial one. But the new prosthetic valve designs necessitate testing for durability estimate and failure method. It is significant to simulate the circulation system by the building of a pulse duplicator system. This study is stated by clarifying the parameter and implementation steps of the pulse duplicator system in which the different researchers have utilized the system and tried to explain the design steps of using this system wit

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Apr 05 2011
Journal Name
Global Journal Of Health Science
Analysis of Acute Viral Hepatitis (A and E) in Iraq
...Show More Authors

Hepatitis, an inflammation of the liver, has a number of infectious and non-infectious causes. Two of the viruses that cause hepatitis (hepatitis A and E) can be transmitted through water and food; hygiene is therefore important in their control. First, to assess the importance of HAV and HEV as a possible diagnosis for clinically diagnosed patients with acute viral hepatitis. Second, to assess the prevalence of hepatitis A and E in all provinces of Iraq and study its association with age, gender. This study consisted of two groups: The first group consisted of 2975 patients with a clinical diagnosis of acute viral hepatitis. The second group consisted of a total of 9610 persons, which were recruited by surveying a nationally representative

... Show More
View Publication
Crossref (14)
Crossref