Preferred Language
Articles
/
jcois-460
Phonological features   For spoken text in the language
...Show More Authors

This research attempted to take advantage of modern techniques in the study of the superstructural phonetic features of spoken text in language using phonetic programs to achieve more accurate and objective results, far from being limited to self-perception and personal judgment, which varies from person to person.
    It should be noted that these phonological features (Nabr, waqf, toning) are performance controls that determine the fate of the meaning of the word or sentence, but in the modern era has received little attention and attention, and that little attention to some of them came to study issues related to the composition or style Therefore, we recommend that more attention should be given to the study of these features because of their importance in uncovering aspects that have not yet been investigated.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of The College Of Languages (jcl)
Das literarische Bild und die sprachliche Struktur der Sprichwörter bei der gegenseitigen Übersetzung im Deutschen und Arabischen The literary image in the translation of the German and Arabic proverbs
...Show More Authors

Vorwort:

                              Die Übersetzung gilt in der Vergangenheit als Brücke zwischen  verschiedenen Gesellschaften. Sie spielt eine große Rolle im Bereich Kulturaustausch der Länder. Die Araber haben das früh betrachtet, und die Übersetzung als Wissenschaft wird eine der wichtigsten Lehren. Viele griechische Wissenschaften waren durch Übersetzung in den arabischen Ländern bekannt.

In dieser Forschung findet man einen Überblick über die Wichtigkeit der Sprichwörterübersetzung und welche Rolle spielt diese Übersetzung im Z

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 15 2022
Journal Name
Journal Of Baghdad College Of Dentistry
The effect of age on the clinicopathological features of oral squamous cell carcinoma
...Show More Authors

Background: Squamous cell carcinoma is a disease of elderly peopleand it is uncommon in people with less than 40 years old; however many literatures revealed that tumor developing in patients younger than forty years appears more aggressive at the time of diagnosis. The purpose of the present study was to focus on the clincopathological features of the oral SCC in different age groups. Material and methods: In this study thirty five cases of paraffin embedded tissue blocks of oral squamous cell carcinoma were studied. The age range was from 16 to 80 years. The clinicopathological data were recorded for evaluating the tumor characters according to age of patients. Results : The age was not significantly correlated to the clinicopathological

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Prepodavatel Xxi Vek
The Structure of Russian Participles: Special Features of the Grammar Meaning of State
...Show More Authors

View Publication
Crossref
Publication Date
Wed Mar 02 2022
Journal Name
Journal Of Educational And Psychological Researches
Assessing English Language Knowledge of the Scholarship Students in the Scientific Colleges and the Preparatory Year at the Islamic University of Madinah.
...Show More Authors

This research aimed to identify the level of English language knowledge among the students of scientific colleges and the preparatory year (scholarship students) at the Islamic University of Madinah. The research was limited to identifying students at the meanings of vocabulary and grammar of the English language. The researcher used a descriptive approach to achieve study goals. It applied three tools to collect information from the targeted sample; first, a test for determining the level of students in the achievement of vocabulary which applied to (69) students. Second, a test to determine the level of students in the English language grammar, (73) students took part. Third, a survey to get students’ opinions about the program of te

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
Al-mustansiriyah Journal Of Science
Encrypting a Text by Using Affine Cipher and Hiding it in the Colored Image by Using the Quantization stage
...Show More Authors

ST Alawi, NA Mustafa, Al-Mustansiriyah Journal of Science, 2013

View Publication
Publication Date
Thu Oct 01 2015
Journal Name
Al-academy
Power of language and carriers meaning in communication discourse: كاظم مؤنس عزيز
...Show More Authors

It reveals speech communication whether it is legible audible or visible on a comprehensive formula inhabited open language on the modalities for reporting cases of the source say, making communication cognitive processes, is not to produce arguments as it is about the generation of the content of communication, so the contact of any kind remains practice for the cognitive action by the language in which it operates as a way agreed to their units between the poles of communication circle in the framework of a certain socio-cultural context, and that becomes the basis of the text of the message external referrals, making it feasible for multiple readings in semantic dimensions and deliberative

 
... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Jan 08 2024
Journal Name
Al-academy
Medea Euripides between text and contemporary theatrical presentation
...Show More Authors

It is not available for us to go back in time and see plays old and it plays giants tragedy ancient Greek (Aeschylus, Sofokls, and yourbedes) through the eyes of a generation ago, and if we were able to go back to Ntegathm play it is certain that we will not taste or Nstassig for much of what we see from these offers will not afford the traditional religious rituals, which was accompanied also dance and music in the style of ancient Greek play was representing a large part of the theater see manifestations Can our eyes and ears we twentieth century audience to accept those appearances, and it was then?
Inevitably it will look like a museum bycollection not only. So we find ourselves in the light of the foregoing forced When you do rem

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref