Preferred Language
Articles
/
jcolang-666
A Study of Feminist Stylistic Analysis of Language Issues of Gender Representation in Selected Literary text
...Show More Authors

Stylistics is the analysis of the language of literary texts integrated within  various approaches to create a framework of different devices that describe and distinct a particular work. Therefore, feminist stylistics relied on theories of feminist criticism tries to present a counter- image of a woman both in language use and society, to draw attention , raise awareness and change ways that gender represents. Feminist stylistic analysis is related not only to describe sexism in a text, but also to analyze the way that point of view, agency, metaphor, and transitivity choices are  unanticipatedly and carefully connected to issues of gender(Mills,1995:1)                                                                  

       The study tries to discuss matters of gender representation in stylistic analysis and how questions and messages of gender are deducted and exposed when reading and interpreting a text. Moreover, the concept of transitivity and how meaning is encoded and adopted by different patterns      of transitivity will be analyzed and investigated.                                    

  The study has shown that transitivity patterns are used as a device to analyze gender representation as well as to describe the ideational meaning which involves the experiential realization of the world. The results of the analysis of transitivity choices of the selected romantic scene have shown that the whole number of processes are nineteen, the female does five processes in her role as an actor, whereas male shows fourteen which are  the highest number in his performance. The male appears to be the active participant agent who is conscious and in control of his action, whereas the female appears to be passive in her quality, volition and being affected or recipient actor. Also, it is seen that feminist analysis tries to create a new message and picture of woman position; this is depicted by the essential role of the readers' assumption and contextual factors of the text in the process of interpretation.                                             

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Reflection of knowledge workers characteristics on knowledge acquision “Survey Study of the views of a sample of engineers and technicians in the Directorate of Electricity In the city of Sulaymaniyah
...Show More Authors

Purpose: The research aims to diagnose the current availability of knowledge workers characteristics and the role of these characteristics in knowledge acquision in the city of Sulaimaniya Directorate of Electricity, and to identify the differences between personal and occupational characteristics of a sample of research and its impact on the availability of such properties.

Design/methodology/approach :to achieve the objectives of the research questionnaire was developed especially for it and then distributed to a sample of engineers and technicians working in the Directorate of Electricity city of Sulaimaniya, where the sample of the research (52) respondents.

Findings:  the most important conclusions reached

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Relationship Between Competitive Intelligence and Entrepreneurial Performance By Centralizing Strategic Vigilance: Field study of a sample of National colleges in Iraq
...Show More Authors

The aim of this study is to highlight the relationship between competitive intelligence and Entrepreneurial Performance by centralizing the strategic vigilance of a sample of civil faculties in Baghdad. The sample of the study was targeted at 10 Iraqi civil colleges, which consisted of (133) members of the faculty council of the faculties, the search data was collected using the questionnaire form as the main research tool. The results showed that the correlation and influence of competitive intelligence and strategic vigilance in the Entrepreneurial Performance, as well as the role of strategic vigilance as an intermediate variable between competitive intelligence and Entrepreneurial Performance.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Jan 08 2024
Journal Name
Al-academy
Medea Euripides between text and contemporary theatrical presentation
...Show More Authors

It is not available for us to go back in time and see plays old and it plays giants tragedy ancient Greek (Aeschylus, Sofokls, and yourbedes) through the eyes of a generation ago, and if we were able to go back to Ntegathm play it is certain that we will not taste or Nstassig for much of what we see from these offers will not afford the traditional religious rituals, which was accompanied also dance and music in the style of ancient Greek play was representing a large part of the theater see manifestations Can our eyes and ears we twentieth century audience to accept those appearances, and it was then?
Inevitably it will look like a museum bycollection not only. So we find ourselves in the light of the foregoing forced When you do rem

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 02 2019
Journal Name
Advances In Intelligent Systems And Computing
Spin-Image Descriptors for Text-Independent Speaker Recognition
...Show More Authors

Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 27 2025
Journal Name
Al–bahith Al–a'alami
THE IDEOLOGY OF UNIVERSITY STUDENTS TOWARDS POLITICAL DISCOURSE IN SATELLITE CHANNELS: A field study on media students at Al-Mustansiriya University))
...Show More Authors

‏The speech delivered by political blocs and parties and broadcasted by satellite channels, social and communication media has different ideologies and orientations: moderate speech calling for calm or one raising crises.‏The latter is considered very challenging due to its local and international reference.‏, this paper aims at uncovering these challenges especially during the political crisis witnessed in Iraq. This paper sheds light on the most important crisis that spread in public opinion, broadcasted by satellite, and raised by politicians who are competing to gain authority leading to a lack of peoples, confidence in them.‏This matter should not be neglected at all; e

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 28 2020
Journal Name
Journal Of The College Of Education For Women
Preparing the Arabic Language Teacher for Non-Native Speakers, Following the Experience of the Arabic Language Institute at the International University of Africa: منى يوسف محمَّد وقيع الله
...Show More Authors

The study aims to examine the reality of preparing the Arabic language teacher for non-native speakers by presenting the experience of the Arabic Language Institute at the International University of Africa. Thus, it addresses the following questions: How is it possible to invest the long scientific experiences in proposal and experiment preperations to qualify Arabic language teachers for non-native speakers? What is the reality of preparing an Arabic language teacher at the Institute? How did the Arabic Language Institute process teacher preparation? What are the problems facing the preparation of the Arabic language teachers and the most important training mechanisms used in that Institute?What problems faced the implementation of the

... Show More
View Publication Preview PDF
Crossref