Preferred Language
Articles
/
jcolang-611
Basis of deconstruction in poetic text: بنەماكانی هەڵوەشاندنەوە لە دەقی شیعریدا
...Show More Authors

Deconstruction theory is a theory that appeared After construction theory, and it tends, through some key principles, to reach the purposive and the main meaning of the text by the means of different perspectives. In other words, deconstruction is a critical literary theory and a contemporary philosophical approach that work together to reach exact concept of the text, and this is achieved through reading and analyzing the text. Therefore, deconstruction has specified some principles so as to reach the exact meaning of the text through these different principles.

پێشەكی:

تیۆری هەڵوەشاندنەوە تیۆرێكە پاش بوونیادگەری سەریهەڵداوە و دەیەوێت لەڕێگەی چەند بنەمایەكی سەرەكیەوە كار بۆ گەیشتنە واتای مەبەستدار و سەرەكی دەق بكات، لە ڕێگەی گۆشە نیگای جیاوازەوە. بەواتایەكی تر هەڵوەشاندنەوە تیۆرێكی ئەدەبی ڕەخنەیی و ڕێبازێكی فەلسەفی هاوچەرخە و پێكەوە كاردەكەن لەپێناو گەیشتنە چەمكی تەواوی دەقەكە، ئەمەش لەڕێگەی خوێندنەوە و ڕاڤەی دەقەكەوە دەبێت،    بۆیە هەڵوەشاندنەوە چەند بنەمایەكی دیاریكردووە، تاوەكو لەڕێگەی ئەم بنەما جیاوازانەوە بگاتە واتای تەواوی دەق. 

       ئەم لێكۆڵینەوەیە پێكهاتووە لە دوو بەش، لە بەشی یەكەمدا باس لە چەمك و پێناسەی هەڵوەشاندنەوە و سەرهەڵدان و گەشەكردن و فەلسەفەی ئامادە و بنەما و ستراتیژەكانی هەڵوەشاندنەوە لە ڕوانگەی دریداوە كراوە.

      لە بەشی دووەمدا بەپێی بنەماو ستراتیژەكانی هەڵوەشاندنەوە كار لەسەر دەقی شیعری كراوە و دەقی شیعری (تەلیسم)ی ئەنوەر قادر جاف وەك نموونە وەرگیراوە.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 08 2024
Journal Name
Ijaz Arabi Journal Of Arabic Learning
Patterns Of Arabic Poetic Vision In The Collection Of Al-Abbas Bin Mardas Al-Sulami/ أنماط الرؤيا الشعرية في ديوان العباس بن مرداس السلمي
...Show More Authors

A poetic vision appeared in the poem of Al-Abbas bin Mardas Al-Sulami. He lived in the eras of pre-Islamic times and the emergence of Islam. The focus of this research: is the study of poetic text in the pre-Islamic era and the era of early Islam. The research followed a method in treating poetic texts, as it is based on presenting poetic texts from the collection of Al-Abbas bin Mardas, explaining the features of his poetic vision, and examining all the external factors that surrounded the poet and influenced his vision and all his thoughts. The results of this research was that Al-Abbas Ibn Mardas revealed some of the positions that he found contradicted the authentic Arab value before the advent of Islam, and the poet Abbas bin Mardas tr

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 02 2019
Journal Name
Advances In Intelligent Systems And Computing
Spin-Image Descriptors for Text-Independent Speaker Recognition
...Show More Authors

Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Thu Mar 01 2018
Journal Name
Nauchforum
THE PROBLEM OF TRANSLATING METAPHOR IN AN ARTISTIC TEXT (ON THE MATERIAL OF RUSSIAN AND ARABIC LANGUAGES)
...Show More Authors

THE PROBLEM OF TRANSLATING METAPHOR IN AN ARTISTIC TEXT (ON THE MATERIAL OF RUSSIAN AND ARABIC LANGUAGES)

Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Sun Jan 17 2021
Journal Name
Arab Science Heritage Journal
النص بين فعلي الكتابة و القراءة
...Show More Authors

         If the text has a writer, then he also has a reader who is multiple in his readings, interpretations and understanding of the text, in addition to that he is still in contradiction to researchers in what is the ideal reader o

View Publication Preview PDF
Crossref
Publication Date
Tue Dec 22 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Continuous improvement of technology and its role In reducing the costs in accordance with the management style On the basis of the activities (ABM): Applied Research in the General Company for Textile Industries / hula
...Show More Authors

The administration on the basis of the activities designed to evaluate the performance of activities in terms of cost, time and quality by identifying activities that add value and those that are no add value and  enables the administration of making up their own continuous improvement in production, through lower costs and reduce the time and improve the quality   and reduce the incidence of spoilage and waste, y based search Ally premise that (the continuous improvement of the adoption of management style on the basis of the activities helps management in decision-making wise to reduce  costs) to prove the hypothesis has sought research to achieve its goal of  Alkadivh and Alkoppelan     &nb

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 14 2022
Journal Name
Nasaq Journal
The Effect of Co-text on the Comprehensibility of World Englishes
...Show More Authors

MR Younus, Nasaq Journal, 2022

View Publication
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (4)
Scopus Crossref