Preferred Language
Articles
/
jcois-460
Phonological features   For spoken text in the language
...Show More Authors

This research attempted to take advantage of modern techniques in the study of the superstructural phonetic features of spoken text in language using phonetic programs to achieve more accurate and objective results, far from being limited to self-perception and personal judgment, which varies from person to person.
    It should be noted that these phonological features (Nabr, waqf, toning) are performance controls that determine the fate of the meaning of the word or sentence, but in the modern era has received little attention and attention, and that little attention to some of them came to study issues related to the composition or style Therefore, we recommend that more attention should be given to the study of these features because of their importance in uncovering aspects that have not yet been investigated.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 08 2024
Journal Name
Al-academy
Medea Euripides between text and contemporary theatrical presentation
...Show More Authors

It is not available for us to go back in time and see plays old and it plays giants tragedy ancient Greek (Aeschylus, Sofokls, and yourbedes) through the eyes of a generation ago, and if we were able to go back to Ntegathm play it is certain that we will not taste or Nstassig for much of what we see from these offers will not afford the traditional religious rituals, which was accompanied also dance and music in the style of ancient Greek play was representing a large part of the theater see manifestations Can our eyes and ears we twentieth century audience to accept those appearances, and it was then?
Inevitably it will look like a museum bycollection not only. So we find ourselves in the light of the foregoing forced When you do rem

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Nasaq Journal
Social Media and Language Evolution: A Review of Current Theoretical Efforts on Communication and Language Change
...Show More Authors

This article is an endeavour to highlight the relationship between social media and language evolution. It reviews the current theoretical efforts on communication and language change. The descriptive design, which is theoretically based on technological determision, is used. The assumption behind this review is that the social media plays a significant role in language evolution. Moreover, different platforms of social media are characterized by being the easiest and fastest means of communication. It concludes that the current theoretical efforts have paid much attention to the relationship between social media and language evolution. Such efforts have highlighted the fact that social media platforms are awash with a lot of acronyms, cybe

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Investigating the Aerodynamic Surface Roughness Length over Baghdad City Utilizing Remote Sensing and GIS Techniques
...Show More Authors

This study calculated the surface roughness length (Zo), zero-displacement length (Zd) and height of the roughness elements (ZH) using GIS applications. The practical benefit of this study is to classify the development of Baghdad, choose the appropriate places for installing wind turbines, improve urban planning, find rates of turbulence, pollution and others. The surface roughness length (Zo) of Baghdad city was estimated based on the data of the wind speed obtained from an automatic weather station installed at Al-Mustansiriyah University, the data of the satellite images digital elevation model (DEM), and the digital surface model (DSM), utilizing Remote Sensing Techniques. The study area w

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2008
Journal Name
Journal Of The College Of Languages (jcl)
The Characteristics of English Linking Adverbials
...Show More Authors

Linking adverbials are used to organize and bridge together extended stretches of discourse to make the text coherent. They are explicit indicators of the communicative function of the sentence and writers use them to let their readers follow what has already been said and to help them anticipate what is about to follow.
Linking adverbials include those relations of addition, enumeration, summation, apposition and so on. Through the use of these adverbials, the writer is able to organize and develop his ideas and help the reader follow him from one sentence to another. Thus, a linking adverbial is a semantic relation used to show the way in which what is to follow is systematically connected to what has gone before. So, they have anap

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2015
Journal Name
Al-academy
Artistic features of women form in (Auguste-Dominique Ingres) works: نـدى عايـد يوسـف
...Show More Authors

Between decline and appearing dichotomy, art history comes to announce birth of an era that glories past and find new names that are emerged from yearning to past and represented by neo-classical, By refusing the previous approaches and create topics that touché culture and derived from it through s revitalizing ideal beauty standards. One of neo-classical artists, who tried to simulate the classical works, is (Jean-Auguste-Dominique Ingres), who put framework for semantic aesthetic of the art form by revitalizing past glories and deeply searching myths and cultures through finding special artistic features that emphasizes artist own stylistics and identity. This research studies artistic features of women form in (Jean-Auguste-D

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
The Use of English as Lingua Franca in the Classes of UKM: as A Case of Study
...Show More Authors

           English has for long been one of the most widely used media of communication globally, especially in the Malaysian universities. It has been termed as a Lingua Franca because it is shared with other languages which are considered first languages by different speakers. For this reason, English as a Lingua Franca (ELF) has attracted a number of researchers to investigate its variety via other languages in various communities. The objective of this paper is therefore to establish the strategies which are employing by the international students at the National University of Malaysia/ UniversitiKebangsaan Malaysia (UKM) as an example of one of the Malaysian universities; when they e

... Show More
View Publication Preview PDF