Preferred Language
Articles
/
jcois-293
Textual jurisprudence and jurisprudence of the science of the text: Linguistic study
...Show More Authors

The modern textual study researched the textuality of the texts and specified for that seven well-known standards, relying in all of that on the main elements of the text (the speaker, the text, and the recipient). This study was to investigate the textuality of philology, and the jurisprudence of the science of the text.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Performance evaluation criteria"Applied Study in the General Company for the manufacture of glass and ceramics"
...Show More Authors

Contemporary management is interested in the process of performance assessment  because of its significance in the field of planning and controlling the multiactiveties to attain its goals and uncovering digression of virtual performance after comparing it with the plan or equitable performance.

Digression is analyzed to enable management control centers of authority.

Assessment process significance is closely related by setting definite categories to evaluate the economic activity to know the ability to achieves aims.

This study concentrated on the most important categories that used to evaluate  company understudy with ather categories suggested to complete assessment process.

This study is in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Features of genetic algorithm for plain text encryption
...Show More Authors

The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process

... Show More
View Publication
Scopus (15)
Crossref (4)
Scopus Crossref
Publication Date
Wed May 29 2019
Journal Name
Journal Of Legal Sciences
The Extent of the Civil Liability of the Seller or Provider of Alcohol toward Intoxicated Persons and Their Victims – A Comparative Study
...Show More Authors

There are many harmful acts that occur from drunkards in this case, especially those resulting from car accidents. The world is witnessing dozens or even hundreds of car accidents due to alcohol consumption. These accidents often result in serious injuries that could lead to the death of the drunk driver and those in the car As well as other persons present in the other vehicles with which the incident occurred or pedestrians on the street, as well as damage to private or public property, and if the order of return of the affected persons on the pretext of civil liability (tort) is made as a direct cause of the harmful act, Is entitled Do they like this refer to the liquor seller or their provider as the culprit? Or are they not related to

... Show More
View Publication
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Scientific Development For Studies And Research
The Role of E-Learning in teaching the Arabic language to non- native speakers
...Show More Authors

After the information revolution that occurred in the Western world, and the developments in all fields, especially in the field of education and e-learning, from an integrated system based on the effective employment of information and communication technology in the teaching and learning processes through an environment rich in computer and Internet applications, the community and the learner were able to access information sources and learning at any time and place, in a way that achieves mutual interaction between the elements of the system and the surrounding environment. After the occurrence of the phenomenon of Covid 19, it led to a major interruption in all educational systems that had never happened before, and the disrupt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The mechanisms of generation of Unemployment in Iraq and its types and calculating the Disguised of it: Analytical Study for the period 2003-2015
...Show More Authors

     The objective of this study is to attempt to provide a quantitative analysis to the causes of unemployment  in Iraq and its mechanisms of generation, as well as a review of the most important  types of both visible and invisible unemployment, and an attempt to measure the disguised  unemployment  and analyze the causes. The problem of the research lies in the fact that the Iraqi Economy has been suffered  for  a long time although its characterized by abundant  physical and natural  resources, from the existence of the  phenomenon of unemployment  in the previous two types. Causing a lot of economic problems, represented by the great waste of resources and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Journal Of Computer Science
Dropping down the Maximum Item Set: Improving the Stylometric Authorship Attribution Algorithm in the Text Mining for Authorship Investigation
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Feb 05 2020
Journal Name
Political Sciences Journal
The role and effectiveness of the United Nations Security Council in light of the competition of international powers: an analytical study
...Show More Authors

Abstract As the United Nations approaches its 70th anniversary, the world is going through the most severe accumulation of serious international security failures in recent memory, challenging the UN Security Council’s ability to address them effectively. Over the past four years, crises in Libya, Syria and Ukraine have precipitated a worrisome erosion of great power relations that has complicated Security Council decision making on a number of trouble spots. Its inability to devise consensus responses to the escalating civil war in Syria has been particularly troubling, resulting in the regional spill over into Iraq and the emergence of Islamic State as a new threat to peace in the region and beyond. Meanwhile, the UN’s often under

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
African landlocked countries problems and outlets in the study and classification of geo-political
...Show More Authors

Landlocked countries are displayed geopolitical new geo-political and intended to
countries that do not have sea views, a phenomenon present in four continents of the world
are: Africa, Europe, and Asia, and South America and the number arrived at the present time
to the (44) state the largest number of them in the continent it arrived in Africa (16) countries
in Asia (13) countries and Europe (13) In the State of South America two. This phenomenon
emerged due to the division of federations and empires and colonial treaties and others. But
the negative effects suffered by these countries may vary from one country to another, since
these countries in the continent of Europe, for example, is different from the same cou

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
Tamper Detection in Text Document
...Show More Authors

Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
College Of Islamic Sciences
The most important and important rule in the Quranic perspective "An applied study"
...Show More Authors

Abstract

    All of us are indispensable for this rule (the most important and important) individuals, whether we were groups of leaders or followers of peoples or countries because the rule provides adequate guarantees for the correct positions and drawing the plan for successful decision-makers matching with the balances of Sharia without incompatibility between religious or worldly interests or legal positions and therefore in the framework of the most important appointment And distinguish it from the important from the interests or the appointment of the most important and distinguish from the important from the evils and through this rule we learn about the scientific and practical solutions t

... Show More
View Publication Preview PDF