which is much useful in the Arabic Language generally in the Holly Quran especially. It is the pronoun I have taken in the semantic aspect from it and I have done on the surra sabba which varities the semantical pronoun in it among the pronoun of the speaker the conscience of the addressee the absent such the the siprat pronoun that comes in it with the explanation for its importance and its work and this is the subject of the first unit which I advanced it from the concept of the pronoun Linguistically and convention. After that I have lighten in some meanings which I have done in the surrat as a semantic , magnification , proud, reprimand and others which I ended my research I have reached the results from it varities of the pronounces which used in the surra were between invisible and phenomenon and vary semantic among speaker, address and apsent m much of use linking pronoun in surra in compare the separate conscience and the iess use of the separate conscience some of the pronounces which we lead the sources from the context and other from the details in the pages of the research.
This research was distributed into two sections, the first section was concerned with the concept of value for De Saussair and its methodological impact on his linguistic structural conceptions with respect of the distinction between synchronism and diachronism, the value role of linking function between the sounds and the though, the basing of his theoretical conception on the language being a form and not a material according to this principle and the value impact on the demonstration that the linguistic element acquires its functional importance from the relations inside the language system. It also stopped at the methodological impact of value on defining the analytical linguistic unit and the value role in semantics through the prin
... Show MoreIn this work, the study of corona domination in graphs is carried over which was initially proposed by G. Mahadevan et al. Let be a simple graph. A dominating set S of a graph is said to be a corona-dominating set if every vertex in is either a pendant vertex or a support vertex. The minimum cardinality among all corona-dominating sets is called the corona-domination number and is denoted by (i.e) . In this work, the exact value of the corona domination number for some specific types of graphs are given. Also, some results on the corona domination number for some classes of graphs are obtained and the method used in this paper is a well-known number theory concept with some modification this method can also be applied to obt
... Show MoreAlthough the events of September 2001 marked the United States' employment of solid forces in its direct comprehensive strategy to counter terrorist organizations and any other challenges to US national security, the United States did not lose sight of the importance of the cultural variable. The cultural variable is the United States' most important instrument of soft power in ensuring its dominance of the international system and promoting its global project. France viewed US soft power as a threat to its own civilizational pattern. Therefore, France considers culture to be an inherent component of its national personality and a cornerstone of its international standing as a major force. Additionally, the US-French political and economic
... Show MoreIn this paper we report the use of supersonic jet laser induced fluorescence (LIF) spectroscopy to facilitate the study of the spectra of some organometallic sandwich compounds particularly the metallocenes. The charge-transfer processes within these compounds, especially ligand to metal charge transfer within decamethylrhenocene ( - C5 Me5)2 Re were of particular interest. The spectrum shows a high degree of structures, indicating that there are several levels populated and these molecules are able to undergo many possible transitions
The current study aims to identify the effect of guided visualization strategy in developing the visual perception among kindergarteners. The experimental design was used; pre-post test. A total of (32) boy and girl ranging 5 to 6 years old were selected from al-Rabeea’ kindergarten, directorate of al-karkh 2 / Baghdad. The sample divided into equal two group (16) boy and girl of each one. al-Talaqany’s (2016) visual perception skills test among kindergarteners was adopted to collect the required data. The collected data had processed based on (gender, pre-post test, and age). To achieve the objectives of the study; the researcher set up series of sessions that addressed the guided visualization strategy among kindergarteners compose
... Show MoreColor in the fantasy child theater represents a psychological and sematic symbol in conveying the connotations and clarifying meanings being an exciting and clarifying means. The researcher felt the necessity of shedding light on the color semiotics in the theater shows presented for children which are characterized by fantasy atmospheres and the ability to employ the color semiotics that goes along with the nature of the Iraqi theater shows through the following question:
What is the extent of the representation of the color significance of the mark shown in the fantasy theatrical show presented to the Iraqi child?
The aim of the research is:
Exposing the color utilization and its s
... Show MoreSome of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreVitamin K-dependent protein (VKDP) contributes to the development of lung cancer. The purpose of this research was to better understanding of the role of blood matrix Gla protein (MGP), VKDPs, Malondialdehyde (MDA), Superoxide dismutase (SOD) and Vitamin K (Vit K) in Iraqi patients with lung cancer before and after the first cycle of chemotherapy. Blood samples were collected from Al amal National Hospital for cancer treatment from October 2021 to May 2022, and a total of 80 samples were collected, divided into two groups (40 patient before taking a chemotherapy and 40 patients after taking chemotherapy), ranging in age from 20 to 45 years old. The results showed that although there were highly statistically significant differences in MD
... Show MoreThis study aims to observe and analysis the propaganda discourse image for Daesh, and know how it marketing the fear due to symbols structure, and discover the straight meanings and hidden inspiration, with the ideology that the image presented.
The study is descriptive and qualitative, and the method is analytic survey used semiotic approach.
The most important results of the study refer to:
- Daesh functioning the image in fear manufacture in all it components: the symbol of savageness, body language, color, clothes uniform and professionally shot.
- The indicative meaning of fear promoted by Daesh based of the manufacturing «Holy», and that mean places non-touchable and non-insulted.
- Daesh used in its propagand
Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show More