Preferred Language
Articles
/
jcolang-348
From Personal Issues to National Concerns: A Study in E.M Forster’s Where Angels Fear to Tread & Howards End
...Show More Authors

            E.M. Forster (1879-1970) is one of the important novelists who dealt with the personal and social lives of the people in England during the early beginning of the twentieth century. During his literary career, he developed gradually his views about man and his position in society.

 In his first novel, Where Angels Fear to Tread (1902), the focus is laid on local and personal issues in the lives of the characters. It is limited to the relations between neighbours in small communities. Though the setting is shifted to Italy, Forster does not make full use of this shift to present cultural or racial conflicts; rather he limits his plot to the private troubles of some characters that have no wider interest in life. His characters are isolated from the larger currents of the social and political life, preoccupied with some personal problems that take all their time and energies. But Howards End (1910) shows a clear and important shift from the limited affairs of daily life to the more general and crucial affairs that concern the whole society. He deals with the political and economic issues which were very important in England at that time.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 29 2022
Journal Name
Journal Of The College Of Education For Women
Using Online Platforms to Improve Writing
...Show More Authors

Due to the difficulties that Iraqi students face when writing in the English language, this preliminary study aimed to improve students' writing skills by using online platforms remotely. Sixty first-year students from Al-Furat Al–Awsat Technical University participated in this study. Through these platforms, the researchers relied on stimuli, such as images, icons, and short titles to allow for deeper and more accurate participations. Data were collected through corrections, observations, and feedback from the researchers and peers. In addition, two pre and post-tests were conducted. The quantitative data were analysed by SPSS statistical Editor, whereas the qualitative data were analyzed using the Piot table, an Excel sheet. The resu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 30 2014
Journal Name
College Of Islamic Sciences
Door of operation    (Trying to steer)
...Show More Authors

The method of work is not a method made by grammarians. We have found more than guidance from the ancients and contemporaries; That to the corruption of meaning; or to apparent cost Not accepted by good linguistic taste.

View Publication Preview PDF
Publication Date
Thu Dec 15 2022
Journal Name
Romanian Neurosurgery
Tangential gunshot wound to the head
...Show More Authors

Introduction. Tangential gunshot wounds (TGSW) to the head is the high-velocity bullet that does not penetrate the cranium but passes through the tissue adjoining the cranial cavity, creating a “gutter” wound and indirectly causing cerebral injury. This article presents a reporting case of TGSW to the head, discusses the mechanism underlying this traumatic injury and the possible complications resulting from it, and reviews of literature.  Case description. A thirteen-year-old schoolboy was admitted to the emergency department (ER) of the neurosurgery teaching hospital in Baghdad, Iraq, with a tangential gunshot to the head of an unknown source during civilian protests in Baghdad. In addition to a seizure attack in the ER, his

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Steganographic scheme to avoid statistical Steganalysis
...Show More Authors

significant bits either in the spatial domain or frequency domain sequentially or pseudo
randomly through the cover media (Based on this fact) statistical Steganalysis use different
techniques to detect the hidden message, A proposed method is suggested of a stenographic
scheme a hidden message is embedded through the second least significant bits in the
frequency domain of the cover media to avoid detection of the hidden message through the
known statistical Steganalysis techniques.

View Publication Preview PDF
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
the response to service marketing failure
...Show More Authors

Because of the tremendous changes in the business environment and significant growth in living standards, increased demand for services in general and about the realized practitioners in the field of service that traditional marketing strategies and models administrative based solutions to mono as the price alone does not lead to the desired outcomes with customers and even organizations as it does not apply always for the manufacture of their services unique . therefore , the need to learn marketing service order and a clear and critical to avoid failures in service and the marketing document to knowledge would avoid the organization that the failure in the delivery of service and enhances the desired response to fix it in a tim

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 02 2024
Journal Name
Iraqi J Community Med
Immune Response to Respiratory Syncytial Virus
...Show More Authors

Respiratory syncytial virus (RSV) is an important cause of respiratory infection among children and infants globally. The first line of the immune response against this virus is neutrophils, macrophages, and innate lymphoid cells. Antigen‑presenting cells such as dendritic cells which present the viral antigen to T lymphocytes that mediate viral clearance by T cytotoxic cells and initiate systemic lymphopenia. Humoral immunity will also be stimulated through B‑cell‑stimulating factors derived from epithelial cells of the respiratory tract that play an important factor in antibody production and induction memory to reinfection through IgG and IgA protective antibodies that are useful in vaccine production.

Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Methods To Prevent SQL Injection
...Show More Authors

  In the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack.     SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input  such as form  and then include this input in database requests, typically SQL statements in a way that was not intende

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Planner And Development
The Quantitative Analysis To Assess The Efficiency Of The Transport Network In Sader City
...Show More Authors

     This research examines the quantitative analysis to assess the efficiency of the transport network in Sadr City, where the study area suffers from a large traffic movement  for the variability of traffic flow and intensity at peak hours as a result of inside traffic and outside of it, especially in the neighborhoods of population with  economic concentration.                                                           &n

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Scientific Development For Studies And Research
The Role of E-Learning in teaching the Arabic language to non- native speakers
...Show More Authors

After the information revolution that occurred in the Western world, and the developments in all fields, especially in the field of education and e-learning, from an integrated system based on the effective employment of information and communication technology in the teaching and learning processes through an environment rich in computer and Internet applications, the community and the learner were able to access information sources and learning at any time and place, in a way that achieves mutual interaction between the elements of the system and the surrounding environment. After the occurrence of the phenomenon of Covid 19, it led to a major interruption in all educational systems that had never happened before, and the disrupt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 03 2011
Journal Name
Journal Of Educational And Psychological Researches
Educational activities in the role of government nurseries and its relationship to some variables
...Show More Authors

The skill of management educational activities gradually grow with the experience, but they differ from personal skill educator to another, because each style nanny personally and the way to work. There educator and active movement and vitality that look like happiness and clear during the implementation of the activity, and the other runs educational activities quietly, efficiently and without emotion and clear (dry, 2001: p. 274). And the stage of childhood is one of the most important stages that are based upon the future life as a whole because the man also confirmed by the School of analysis psychological is the son of his childhood and the best example to us what the Holy Prophet Muhammad (peace be upon him): (Every child i

... Show More
View Publication Preview PDF