This research attempted to take advantage of modern techniques in the study of the superstructural phonetic features of spoken text in language using phonetic programs to achieve more accurate and objective results, far from being limited to self-perception and personal judgment, which varies from person to person.
It should be noted that these phonological features (Nabr, waqf, toning) are performance controls that determine the fate of the meaning of the word or sentence, but in the modern era has received little attention and attention, and that little attention to some of them came to study issues related to the composition or style Therefore, we recommend that more attention should be given to the study of these features because of their importance in uncovering aspects that have not yet been investigated.
Vorwort:
Die Übersetzung gilt in der Vergangenheit als Brücke zwischen verschiedenen Gesellschaften. Sie spielt eine große Rolle im Bereich Kulturaustausch der Länder. Die Araber haben das früh betrachtet, und die Übersetzung als Wissenschaft wird eine der wichtigsten Lehren. Viele griechische Wissenschaften waren durch Übersetzung in den arabischen Ländern bekannt.
In dieser Forschung findet man einen Überblick über die Wichtigkeit der Sprichwörterübersetzung und welche Rolle spielt diese Übersetzung im Z
... Show MoreBackground: Squamous cell carcinoma is a disease of elderly peopleand it is uncommon in people with less than 40 years old; however many literatures revealed that tumor developing in patients younger than forty years appears more aggressive at the time of diagnosis. The purpose of the present study was to focus on the clincopathological features of the oral SCC in different age groups. Material and methods: In this study thirty five cases of paraffin embedded tissue blocks of oral squamous cell carcinoma were studied. The age range was from 16 to 80 years. The clinicopathological data were recorded for evaluating the tumor characters according to age of patients. Results : The age was not significantly correlated to the clinicopathological
... Show MoreThis research aimed to identify the level of English language knowledge among the students of scientific colleges and the preparatory year (scholarship students) at the Islamic University of Madinah. The research was limited to identifying students at the meanings of vocabulary and grammar of the English language. The researcher used a descriptive approach to achieve study goals. It applied three tools to collect information from the targeted sample; first, a test for determining the level of students in the achievement of vocabulary which applied to (69) students. Second, a test to determine the level of students in the English language grammar, (73) students took part. Third, a survey to get students’ opinions about the program of te
... Show MoreST Alawi, NA Mustafa, Al-Mustansiriyah Journal of Science, 2013
It reveals speech communication whether it is legible audible or visible on a comprehensive formula inhabited open language on the modalities for reporting cases of the source say, making communication cognitive processes, is not to produce arguments as it is about the generation of the content of communication, so the contact of any kind remains practice for the cognitive action by the language in which it operates as a way agreed to their units between the poles of communication circle in the framework of a certain socio-cultural context, and that becomes the basis of the text of the message external referrals, making it feasible for multiple readings in semantic dimensions and deliberative
The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreIt is not available for us to go back in time and see plays old and it plays giants tragedy ancient Greek (Aeschylus, Sofokls, and yourbedes) through the eyes of a generation ago, and if we were able to go back to Ntegathm play it is certain that we will not taste or Nstassig for much of what we see from these offers will not afford the traditional religious rituals, which was accompanied also dance and music in the style of ancient Greek play was representing a large part of the theater see manifestations Can our eyes and ears we twentieth century audience to accept those appearances, and it was then?
Inevitably it will look like a museum bycollection not only. So we find ourselves in the light of the foregoing forced When you do rem
Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha
... Show More