Preferred Language
Articles
/
jcolang-611
Basis of deconstruction in poetic text: بنەماكانی هەڵوەشاندنەوە لە دەقی شیعریدا
...Show More Authors

Deconstruction theory is a theory that appeared After construction theory, and it tends, through some key principles, to reach the purposive and the main meaning of the text by the means of different perspectives. In other words, deconstruction is a critical literary theory and a contemporary philosophical approach that work together to reach exact concept of the text, and this is achieved through reading and analyzing the text. Therefore, deconstruction has specified some principles so as to reach the exact meaning of the text through these different principles.

پێشەكی:

تیۆری هەڵوەشاندنەوە تیۆرێكە پاش بوونیادگەری سەریهەڵداوە و دەیەوێت لەڕێگەی چەند بنەمایەكی سەرەكیەوە كار بۆ گەیشتنە واتای مەبەستدار و سەرەكی دەق بكات، لە ڕێگەی گۆشە نیگای جیاوازەوە. بەواتایەكی تر هەڵوەشاندنەوە تیۆرێكی ئەدەبی ڕەخنەیی و ڕێبازێكی فەلسەفی هاوچەرخە و پێكەوە كاردەكەن لەپێناو گەیشتنە چەمكی تەواوی دەقەكە، ئەمەش لەڕێگەی خوێندنەوە و ڕاڤەی دەقەكەوە دەبێت،    بۆیە هەڵوەشاندنەوە چەند بنەمایەكی دیاریكردووە، تاوەكو لەڕێگەی ئەم بنەما جیاوازانەوە بگاتە واتای تەواوی دەق. 

       ئەم لێكۆڵینەوەیە پێكهاتووە لە دوو بەش، لە بەشی یەكەمدا باس لە چەمك و پێناسەی هەڵوەشاندنەوە و سەرهەڵدان و گەشەكردن و فەلسەفەی ئامادە و بنەما و ستراتیژەكانی هەڵوەشاندنەوە لە ڕوانگەی دریداوە كراوە.

      لە بەشی دووەمدا بەپێی بنەماو ستراتیژەكانی هەڵوەشاندنەوە كار لەسەر دەقی شیعری كراوە و دەقی شیعری (تەلیسم)ی ئەنوەر قادر جاف وەك نموونە وەرگیراوە.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Al-academy
Deconstruction and the Acting Performance for the Shakespearean Character in the Iraqi Theatre: هيثم عبد الرزاق علي-اياد طارش ساجت
...Show More Authors

Researchers classified deconstruction as a strategy concerned with reading the philosophical, literary, artistic and critical texts according to (construction and deconstruction) binarism, which is an applied procedural space that calls for researching the layers of meaning and its non-closure. It establishes reversals in the text level.  The center changes into a margin and vice versa.  Thus the two researchers sought to study the deconstruction strategy and its work in the theatre field, that deconstruction is considered one of the most important modern currents  that actively inters in reading the theatre show.  The research studies the procedure of the construction and deconstruction of the Iraqi theatre actor reg

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Impact of budget on the basis of activities in the implementation of competitive strategiesApplied Study in the General Company for Electrical Industries - Tammuz Laboratory
...Show More Authors

The Contemporary Business Environment is Surrounded by many quick and continues variable and changes which has an effect on the economic units. These variables and changes like the high competition which need many tools to help them to continue and achieve The critical success. So to achieve this they have many competitive strategies like cost leadership strategy, differentiation strategy and focus strategy.

Budget is regarded one of main tools to execute objectives polices and programs of the economic units, beside show how the economic units had execute the available economic resources.

Activity based on budgeting is regarded one of the modern technique in the m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 27 2022
Journal Name
Journal Of The College Of Basic Education
فهوم الفلشفه الطاويه في كتاب أي.أر .أمهز الشعري شاطيء الاشجا
...Show More Authors

انف كتاب أي.أس.أمىز(6291-9006) انشعشي شاطًء الاشجاس ((1981مه 73قصٍذي. ٌىاقش انبذث ٌزي انقصائذ مه مىضُس فهسفت انطاًٌَ َانتً اتبعٍا انشاعش بذقً فً كتابً.ٌظٍش انكتاب بُضُح انكثٍش مه ملامخ انطبٍعً َانتً تتضمه تغٍشاث دٌىامكًٍ َتطُس تذسٌجً نمختهف انكائىاث انذًٍ .ٌصف انشاعش فً اَل سهسهً مه قصائذي انصُسي انذقٍقًٍ نهكُن مه خلال سؤٌا عمٍقً نهطاًٌَ َانتً تظٍش جهٍا مه خلال تفاعم الاوسان مع انطبٍعً.تُضخ انقصائذ تقاسب انطاًٌَ م

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 15 2018
Journal Name
Arab World English Journal
Pedagogical Stylistics as a Tool in the Classroom: An Investigation of EFL Undergraduate Students' Ability in Analyzing Poetic Language
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Thu Mar 01 2018
Journal Name
Arab World English Journal
Pedagogical Stylistics as a Tool in the Classroom: An Investigation of EFL Undergraduate Students' Ability in Analyzing Poetic Language
...Show More Authors

.

Publication Date
Fri Jun 01 2007
Journal Name
Journal Of Al-nahrain University Science
ON THE GREEDY RADIAL BASIS FUNCTION NEURAL NETWORKS FOR APPROXIMATION MULTIDIMENSIONAL FUNCTIONS
...Show More Authors

The aim of this paper is to approximate multidimensional functions by using the type of Feedforward neural networks (FFNNs) which is called Greedy radial basis function neural networks (GRBFNNs). Also, we introduce a modification to the greedy algorithm which is used to train the greedy radial basis function neural networks. An error bound are introduced in Sobolev space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result is published in [16]).

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The Effect of the Translation of Poetic Poem Into an Artistic Picture in the Achievement of Retention Among Fifth Grade Students
...Show More Authors

The purpose of this research is to identify
the effect of the translation of poetic poem into an artistic picture in the achievement of retention among fifth grade students.
In order to verify the research goal, the first two hypotheses were determined. There are no statistically significant differences between the average scores of the experimental group who study (according to the technical picture) ) And the control group (according to the traditional method of art education) at the level of significance (0,05). The second is that there are no statistically significant differences between the average of the experimental group who study (according to the technical picture) and the control group who study (On According to the trad

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
Images of Woman, She-Camel and Horse and Their Manifestations in Tarafah-ibnulAbd's Poetry between Symbolic Reference and Poetic Function
...Show More Authors

This paper tries to understand the poetic reference in the images of woman, she-camel, horse and their manifestations in Tarafah-ibnulAbd's poetry. There has got my attention the fact that these three images have their own distinct taste which is characterised by a clear rhythm, let alone the  lively nature that is filled with liveliness and activity to be in harmony with the poet's youth. For these three images represented the best manifestations of his psychological and artistic poetics. The paper adopts an artistic analysis to arrive at the psychological aspects of these experiences-the woman, the she-camel, and the horse- and to understand the functions of their images and symbolic reference.

View Publication Preview PDF
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref