Preferred Language
Articles
/
jcoeduw-510
Novel of (Ya Mariam), for Sinan Antwane : A Pragmatic Study
...Show More Authors

Pragmatics looked at literary discourse as an external subject that needed an actor and based on a communicative relationship, that is, it examines literary work by focusing on the author's intent, and attempting to monitor the pilgrim and logical dimension in the text. It focuses on the practical and communicative aspect of the language, which aims to convince the recipient and his or her emotional influence.And the novel (Yamrim) starting from the title (Sos) communication, and building dialogue and pilgrims based on two different logic completely, the logic of optimism and look at things with absolute objectivity, the logic of pessimism and closure and look at things with absolute passion. These two tendencies are embodied by the characters Joseph and Maha, who have the task of recounting most of the events of the novel.The researchers adopted the deliberative approach in the study of the novel through reading semantics and meanings, temporal and spatial indications and aids, and monitoring of interferences, dialogues and the pilgrim dimension, reference references to the writer's destination and text, as well as the use of descriptive analytic methods. It was incumbent on us to present a theoretical framework for the concept of the deliberative approach and a brief presentation of its origin and development, and its applicability to the narrative text, which is included in the first part of the research.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A Suggested Model For Using Customer's Data Management Information System/ A Case Study In Al-Rasheed Bank/General Agent Office/ Nothren Reigon
...Show More Authors

This study aim to  identify the concept of  web based information systems since its one of the important topics that is  usually omitted by our organizations, in addition to,  designing a web based information system in order to manage the customers data of Al- Rasheed bank, as a unified information system that is specialized to the banking deals of the customers with the bank, and providing a suggested model to apply the virtual private network as a tool that is to protect the transmitted data through the web based information system.

This study is considered important because it deals with one of the vital topics nowadays, namely: how to make it possible to use a distributed informat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 15 2020
Journal Name
Al-academy
Novel Coronavirus Pandemic as it is Expressed by Children in Their Drawings On-line: An Analytical Study: نزار بن صالح أحمد عبد الحفيظ
...Show More Authors

This study aimed at identifying how children express the emerging coronavirus in general and according to their age groups (4-13 years) by analyzing 91 of their drawings published online, using the descriptive content analytical approach. The results showed that children's artistic expression of the virus came according to the concepts and ideas they carried about the virus for the age groups of (4-7 years) and (7-9 years), while it came according to visual perception for age groups (9-11 years), and from (11-13) years. Also, most children were aware about the presence of the virus and its widespread around the world, but (99%) of them do not realize the seriousness of the virus. It was confirmed that between (25-34%) of children were su

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Nov 05 2022
Journal Name
Sensors
Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption
...Show More Authors

Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si

... Show More
View Publication
Crossref (11)
Crossref
Publication Date
Thu Feb 04 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Study in the procedural provisions of the action consumption incidents A comparative study Under Iraqi Consumer Protection Act No. 1 of 2010.: Study in the procedural provisions of the action consumption incidents A comparative study Under Iraqi Consumer Protection Act No. 1 of 2010.
...Show More Authors

This research Sheds highlights the procedural protections that must be enjoyed by the consumer in the face of the product, which is the protection of no less dangerous than the substantive protection of our obligations and duties delivered by the legislature upon the product of consumer interest, what is the benefit of the right if the access road to him complicated, so know The consumer has a right to the face of the product, but leaves the claim, either to ignorance For access to this right either to the difficulty of connecting to him.
That this research modest attempt we tried through which to focus on the way to the consumer behavior of arrived right, as we tried to highlight the weaknesses and the complexity of the procedure to

... Show More
View Publication
Publication Date
Sun Mar 28 2021
Journal Name
Journal Of The College Of Education For Women
Argumentative Communication in RawdatAl-MuhebbenwaNozhattAl-Mushtaqeen’s Book by Ibn Al-Qayyem: The Foundations and Mechanisms of its Functioning: مريم إبراهيم علي غبان
...Show More Authors

This research seeks to unravel the components of the argumentative discourse in the Book ofʻRawdat al-MuhebbeenwaNozhatt al-Mushtaqeenʼ - The Garden of Lovers and the Promenade of Longing People – by Ibn Al-Qayyem Al-Jawziyah. This is because this book has a moderate discourse with a sound Islamic thought that is characterized by its sustainability, popularity, realism, and interaction with the successive developments of the new age. This reflects the intellectual maturity the composing process has reached in the philosophy of love and its educational bases in every place and time. To explore the componets, properties, and the working mechanisms of an argumentative discourse in Ibn Qayyem’s book, the present work has been conducted

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
مجلة كلية مدينة العلم الجامعة
Palynological study for nine cultivated species of Asteraceae family
...Show More Authors

The current research included palynological study for nine ornamental cultivated species of Asteraceae family. The study included measurement the dimensions of pollen grains and there shape in polar view and equatorial view, sculpturing,colpi length and width, spines length and number of spines rows between colpiand exine thickness, the study showed variations in pollen grains characters forthe studied taxa

Publication Date
Tue Jun 10 2025
Journal Name
Al–bahith Al–a'alami
ELEMENTS OF BUILDING CONTENT FOR GOVERNMENT WEBSITES: : (An Experimental Study)
...Show More Authors

The study dealt with measuring the impact of the availability of each of the content elements of the interaction, electronic services, and information on the evaluation of the users of the government website for its effectiveness in terms of the site’s functions and for measuring the site’s ability to present the organization’s tasks to customer groups.

Authority is concerned with measuring the confidence of customers in the content of the site, and in the organization as a whole. Validity is related to measuring the effectiveness of employing the site’s content to achieve the goal of its creation and in communicating with customers. Availability It is for measuring the ease of use of the site. The relevance, which means

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref