Preferred Language
Articles
/
jcolang-154
A Pragmatic Analysis of Implied Meaning in Selected Poems by T.S. Eliot and Al-Sayyab
...Show More Authors

In addition to its basic communicative function, language can be used to imply information that is not actually stated, i.e. addressers do not always state exactly (or directly) what they mean. Such instances fall within the domain of pragmatics in that they have to do with how addressers use language to communicate in a particular situation by implication rather than by direct statement. The researcher attempts to demonstrate that the beauty and the multiple layers of meaning in poetry can be better explored if the addressee looks at the lines from a pragmatic perspective in search for implied meaning. There are many devices that can convey implied meaning in poetry, among which are 'rhetorical', 'figurative' or 'literary' devices. But only certain of these devices convey implied meaning, and are thus, the focus of this study. They include metaphor, simile, metonymy, synecdoche, rhetorical question, symbolism, and allusion; in addition to pragmatic devices such as connotation, pragmatic presupposition and deixis.

 

        The problem is that the implied meaning in a given poem (1) might not be grasped by the addressee, or (2) might be interpreted by the addressee differently from the implied meaning intended by the addresser, because, in either case, the addressee might lack awareness of the various figurative and pragmatic devices used by the addresser to convey implied meaning. When a poet uses implied meaning, the addressee is invited to reconstruct the meaning himself with the help of the context, and is, thus, obliged to a particularly active and strenuous participation in the poetry. Consequently, the present study attempts to detect such instances of ambiguity, analyze and disambiguate them as well as clarify the addresser's motives behind such cases.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
The Effective M3Y Residual Interaction In 41Ca As a Nuclear Diffraction Grating of Electrons
...Show More Authors

The total and individual multipole moments of  magnetic electron scattering form factors in 41Ca  have been investigated using a widely successful model which is the nuclear shell model configurations keeping in mind of 1f7/2 subshell as an L-S shell and Millinar, Baymann, Zamick as L-S shell (F7MBZ) to give the model space  wave vector. Also, harmonic oscillator wave functions have been used as wave function of a single particle in 1f7/2  shell. Nucleus 40Ca as core closed and Core polarization effects have been used as a corrective with first order correction concept to basic computation of L-S shell and the excitement energy has been implemented with 2ћω. The

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jun 30 2018
Journal Name
College Of Islamic Sciences
Narrative narration in the poetry of Mohammed Abdul Muttalib   (Top poem as a model)
...Show More Authors

Poets of the age since ancient times to recount the events of their adventures in a fun story style in which the elements of the story of personalities, time and place, and we do not mean this modern art technique (poetic story) as it is now, but was aimed at the pleasures of the other receiving because it is the rule of the quality of literary output, Other times the narrative of events inspired by his broad imagination and this mixing indicates the story's involvement with Arabic poetry to be (poetic story) and this depends entirely on addressing the poet to the recipient, and requires in this narrative to be familiar with the elements of influence and suspense in the other or turned into a monotonous and dull narrative Influential, un

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 23 2026
Journal Name
Al–bahith Al–a'alami
CARTOON SEMIOTIC ABOUT MARCH OF RETURN IN THE PALESTINIAN NEWSPAPERS: : (A Comparative Analytical Study)
...Show More Authors

This study aims to reveal the semiotic of “March of Return” cartoon in the Palestinian journalism, topics, Symbols and semantics that were covered.
This study is descriptive. It uses the survey method. Content analysis, and methodological comparison was also used.

The researcher chose an intentional sample of Palestine and Al-Hayat Al-Jadida newspapers for one year from March 30, 2018 to March 31, 2019, through a comprehensive inventory of all cartoons of the return marches during this period, which amounted to 59 cartoons.

The study has reached the following findings:

Newspapers cartoons focused on the topics of durability of the protester

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 15 2021
Journal Name
Al-academy
Simulation of myths in industrial product design "the seven eyes amulet as a model"
...Show More Authors

The research is to identify the legend of the seven eyes amulet of Babylonian origin and the representations it carried of the link between the Babylonian past and the Islamic present presented in the design works of the promoted products, preserving its impact in the souls as a way to avoid the act of envy, and from this was the research problem that I want to get answers to, which That is (How was the legend of the seven-eyes amulet represented in the design of industrial products?), making its goal to identify how that legend was represented within the design work of marketed industrial products, and in order to reach the answer, the research presented many concepts starting with the legend in its various forms in industrial products.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
The Patterns of Poisoning Exposure in Different Ages in Duhok Governate: A three Years Study (2016, 2017, 2018)
...Show More Authors

Poisoning with toxic substances accidently or deliberately can be life threatening and especially in some countries that lack the essential tests and facilities to identify the types and causes of these toxic substances. In Iraq, as many other countries, poisoning is one of the chronic public health problems. However, very little literature about the pattern of poisoning cases, types and age is available in Duhok Governorate. Therefore, this study was conducted to determine the most common patterns of poisoning and the related age and gender in Duhok Governorate from 2016-2018, which would possibly contribute to the early diagnosis and treatment of poisoning. The present study was conducted for three years, started from 1st of

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Account the expected values ??for a single particle to a group of atoms and ions
...Show More Authors

Technique was used to retail for analyzing atom beryllium ion cathode of an atom lithium to six pairs of functions wave which two ?????? and the rest of the casing moderation and to analyze atom lithium ion Mob atom beryllium to three pairs of functions wave pair of casing and the rest of the casing moderation using function wave Hartree Fock and each casing email wascalculate expected values ??....

View Publication Preview PDF
Publication Date
Mon Mar 17 2014
Journal Name
Arabian Journal For Science And Engineering
Thermal and Hydraulic Characteristics of a Novel Helical Coiled Tube Used as a Heat Exchanger
...Show More Authors

In the present work, the thermo-fluid characteristics of a heat exchanger formed of helical coiled tubes immersed in cold water are investigated experimentally. Two types of helical coiled tube are tested, a conventional vertical single helical coiled tube and a new triple vertical helical coiled tube in parallel connection called as meshed coils. The effect of hot water flow rates inside the tubes (ranges from 2.67 to 7.08 l/min), and its inlet temperatures (namely 50, 60, 70 and 80 °C) are investigated. The experimental results show that increasing the flow rate inside the meshed coils leads to decrease the temperature difference between inlet and outlet. An enhancement of heat transfer for meshed coils compared to single coil has been n

... Show More
View Publication
Scopus (13)
Crossref (10)
Scopus Crossref
Publication Date
Tue Dec 09 2025
Journal Name
Journal Of Al-farahidi’s Arts
Artificial Intelligence Applications in Machine Translation and Their Role in Bridging Semantic Gaps Across Languages: A Comparative Analytical Study of Chat GPT and Deep Seek
...Show More Authors

With the fast-growing of neural machine translation (NMT), there is still a lack of insight into the performance of these models on semantically and culturally rich texts, especially between linguistically distant languages like Arabic and English. In this paper, we investigate the performance of two state-of-the-art AI translation systems (ChatGPT, DeepSeek) when translating Arabic texts to English in three different genres: journalistic, literary, and technical. The study utilizes a mixed-method evaluation methodology based on a balanced corpus of 60 Arabic source texts from the three genres. Objective measures, including BLEU and TER, and subjective evaluations from human translators were employed to determine the semantic, contextual an

... Show More
Preview PDF
Publication Date
Wed Jan 15 2025
Journal Name
International Endodontic Journal
Fabrication and characterization of 3D-printed polymeric‐based scaffold coated with bioceramic and naringin for a potential use in dental pulp regeneration (in vitro study)
...Show More Authors

3D‐printed scaffolds loaded with healing directed agents could be employed for better treatment outcome in regenerative dentistry. The aim of this study was to fabricate and characterize simple 3D‐printed poly lactic acid (PLA) scaffolds coated with nanoHydroxyapatite (nHA), Naringin (NAR), or their combination, and testing their morphological, chemical, mechanical, antibacterial, biocompatible and bioactive properties. Methodology: Two variants pore sizes, 300 and 700 μm, of 3D‐printed PLA disc scaffolds measuring (10 × 1 mm) were fabricated. These scaffolds were dip‐coated with nHA, NAR, or both (nHA/NAR). Field emission scanning electron microscopy (FeSEM), energy‐dispersive X‐ray spectroscopy (EDX), Fourier transfo

... Show More
View Publication