Preferred Language
Articles
/
jcolang-611
Basis of deconstruction in poetic text: بنەماكانی هەڵوەشاندنەوە لە دەقی شیعریدا
...Show More Authors

Deconstruction theory is a theory that appeared After construction theory, and it tends, through some key principles, to reach the purposive and the main meaning of the text by the means of different perspectives. In other words, deconstruction is a critical literary theory and a contemporary philosophical approach that work together to reach exact concept of the text, and this is achieved through reading and analyzing the text. Therefore, deconstruction has specified some principles so as to reach the exact meaning of the text through these different principles.

پێشەكی:

تیۆری هەڵوەشاندنەوە تیۆرێكە پاش بوونیادگەری سەریهەڵداوە و دەیەوێت لەڕێگەی چەند بنەمایەكی سەرەكیەوە كار بۆ گەیشتنە واتای مەبەستدار و سەرەكی دەق بكات، لە ڕێگەی گۆشە نیگای جیاوازەوە. بەواتایەكی تر هەڵوەشاندنەوە تیۆرێكی ئەدەبی ڕەخنەیی و ڕێبازێكی فەلسەفی هاوچەرخە و پێكەوە كاردەكەن لەپێناو گەیشتنە چەمكی تەواوی دەقەكە، ئەمەش لەڕێگەی خوێندنەوە و ڕاڤەی دەقەكەوە دەبێت،    بۆیە هەڵوەشاندنەوە چەند بنەمایەكی دیاریكردووە، تاوەكو لەڕێگەی ئەم بنەما جیاوازانەوە بگاتە واتای تەواوی دەق. 

       ئەم لێكۆڵینەوەیە پێكهاتووە لە دوو بەش، لە بەشی یەكەمدا باس لە چەمك و پێناسەی هەڵوەشاندنەوە و سەرهەڵدان و گەشەكردن و فەلسەفەی ئامادە و بنەما و ستراتیژەكانی هەڵوەشاندنەوە لە ڕوانگەی دریداوە كراوە.

      لە بەشی دووەمدا بەپێی بنەماو ستراتیژەكانی هەڵوەشاندنەوە كار لەسەر دەقی شیعری كراوە و دەقی شیعری (تەلیسم)ی ئەنوەر قادر جاف وەك نموونە وەرگیراوە.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 22 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Continuous improvement of technology and its role In reducing the costs in accordance with the management style On the basis of the activities (ABM): Applied Research in the General Company for Textile Industries / hula
...Show More Authors

The administration on the basis of the activities designed to evaluate the performance of activities in terms of cost, time and quality by identifying activities that add value and those that are no add value and  enables the administration of making up their own continuous improvement in production, through lower costs and reduce the time and improve the quality   and reduce the incidence of spoilage and waste, y based search Ally premise that (the continuous improvement of the adoption of management style on the basis of the activities helps management in decision-making wise to reduce  costs) to prove the hypothesis has sought research to achieve its goal of  Alkadivh and Alkoppelan     &nb

... Show More
View Publication Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (3)
Scopus
Publication Date
Wed Dec 14 2022
Journal Name
Nasaq Journal
The Effect of Co-text on the Comprehensibility of World Englishes
...Show More Authors

MR Younus, Nasaq Journal, 2022

View Publication
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jan 04 2022
Journal Name
Iraqi Journal Of Science
Text Compression & Encryption Method Based on RNA and MTF
...Show More Authors

The sending of information at the present time requires the speed and providing protection for it. So compression of the data is used in order to provide speed and encryption is used in order to provide protection. In this paper a proposed method is presented in order to provide compression and security for the secret information before sending it. The proposed method based on especial keys with MTF transform method to provide compression and based on RNA coding with MTF encoding method to provide security. The proposed method based on multi secret keys. Every key is designed in an especial way. The main reason in designing these keys in special way is to protect these keys from the predication of the unauthorized users.

View Publication Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More
Publication Date
Thu Aug 27 2020
Journal Name
Arab Science Heritage Journal
تعالق النص القرآني في شعر كعب بن مالك الأنصاري
...Show More Authors

     The Qur'an was revealed with a clear Arabic tongue, and it seized minds, and was astonished by its eloquence and eloquence of tastes, so it was a new dawn, and a nucleus for the birth of a new literature inspired by the tolerant thought of Islam, its fresh words, and its delicate and revealing meanings

View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of The College Of Languages (jcl)
رواية بوهيميا الخراب دراسة تأويلية في جدلية النص والزمن
...Show More Authors

Bohemia AL-Kharab for Salah Salah Which contain 477Paper deal With History of Nathion This Novel Has a different styl from another IraQis Novels, this Novel has no conversation this is the basic reason Which hav this research .

The novel have 3 versions , the first one deal with explain the text in different ways , the second contains the realation ship between the text and the reader .

Which appear very clear in novel from up to down , whil the third one and the last explaine

The hermonologiq

The time bylose the relation in the novel.

The last thing is the conclusion which has the simple things  conclude by the researcher from several readings  to the novel

 

 <

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
A Survey on Arabic Text Classification Using Deep and Machine Learning Algorithms
...Show More Authors

    Text categorization refers to the process of grouping text or documents into classes or categories according to their content. Text categorization process consists of three phases which are: preprocessing, feature extraction and classification. In comparison to the English language, just few studies have been done to categorize and classify the Arabic language. For a variety of applications, such as text classification and clustering, Arabic text representation is a difficult task because Arabic language is noted for its richness, diversity, and complicated morphology. This paper presents a comprehensive analysis and a comparison for researchers in the last five years based on the dataset, year, algorithms and the accu

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Crossref