This study is marked by: The ignorant poem and body language
Its main objective is to reveal the manifestations of this language in the text mentioned, and accordingly, the sieve poem has been read semantic (semantic) and hermeneutic, revealing the poet's ability to employ symbols and signals (body language) in the poem chosen for this purpose; The existence of such language in pre-Islamic poetry. After a long reflection and reading, the signs and symbols of the physical movement of the body, and its feminine and aesthetic manifestations were identified, and this was achieved through the use of modern critical methodologies that directly affect this language. The study consisted of an introduction and three topics, followed by the conclusion of the most important results, and then a list of sources and references.
The most important results were as follows:
• This poem, and the like, is a non-rejection of contemporary theories of criticism, and this is proved by this study, the text ignorant text is committed to the technical and aesthetic standards required by human texts.
• In the poem there is a clear synergy between non-linguistic and linguistic signs, such as facial expressions, hand movements, head, tones, exhales, and dress. These ensuing bodily movements produced a series of symbols and connotations.
Reading the body language in the poem was based on some functional analysis of the members. Finally, the study recommends the need to intensify modern monetary efforts directed towards the ignorant text, because it is a text carrying a flood of signals that contribute to the reproduction of this text
ABSTRACT
The research aims to clarify the role of electronic marketing and what it can achieve in promoting the products of the national industry in Iraq. Marketing channel depends on modern communication and information technology that industrial and metal companies can use in promoting and selling their products along with traditional marketing outlets. To achieve the objectives of the research, a questionnaire was used, which consists of three axes, the first includes the personal data of the sample (gender, age, educational attainment, place of residence, marital status, income level), while the second axis includes various questions about the products of the national industry. Third axis includes que
... Show MoreThe current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on
... Show MoreSubstantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe present study aims at identifying the effect of organizational pressure with its aspects (management, work team, nature and conditions of work, external environment) on job performance in all its dimensions (commitment and effort made, capabilities and the rapidity of performance, motivation and job satisfaction, work environment) for the university teacher at the Faculty of Economics, Commercial and Management Sciences at the University of Djelfa, Algeria.
In this research, the descriptive analytical approach is used. Data was collected through the distribution of a questionnaire to a sample that included 130 permanent teachers before being analyzed using the (SPSS) statisti
... Show MoreThe research aims to identify the effect of using the strategy of Roundhouse on the achievement of fourth-grade students of computer and their Attitudes towards it. The research sample consisted of (61) fourth-grade secondary school students distributed into the experimental group consisted of (31) students study computer according to the Roundhouse strategy, and the control group consisted of (30) students follow the traditional method. The researcher designed an achievement test consisting of (30) items of multiple choice. To measure the attitudes of students towards the computer, a questionnaire of (32) paragraphs with three alternatives was designed by the researcher. The results showed that there is a statistically significant diffe
... Show MoreThis research dealt with the impact of internal control on tax performance using balanced scorecard indicators because of its special importance in improving tax performance and reform. The internal control system is a safety valve for senior management in all organizations, it plays an important role in the regularity and development of work and the fight against corruption To provide reliable and accurate data and information, follow up on compliance with laws, regulations and instructions. The aim of this research is to demonstrate how control affects tax performance and how to adapt internal control components to improve tax performance. In the General Authority for taxes and its branches,. The research resulted in a number of conclu
... Show More