Preferred Language
Articles
/
qxgm-ZQBVTCNdQwCiCNs
A GENRE-BASED ANALYSIS OF POLITICAL SPEECHES IN THE UN GENERAL ASSEMBLY
...Show More Authors

Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
International Journal Of Applied Linguistics And English Literature
Human Rights at Stake: Shirley Jackson’s Social and Political Protest in “The Lottery”
...Show More Authors

Nowhere is American author Shirley Jackson’s (1916-1965) social and political criticism is so intense than it is in her seminal fictional masterpiece “The Lottery”. Jackson severely denounces injustice through her emphasis on a bizarre social custom in a small American town, in which the winner of the lottery, untraditionally, receives a fatal prize. The readers are left puzzled at the end of the story as Tessie Hutchinson, the unfortunate female winner, is stoned to death by the members of her community, and even by her family. This study aims at investigating the author’s social and political implications that lie behind the story, taking into account the historical era in which the story was published (the aftermath of th

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The role of the green human resources management practices in a achieving requirements of environmental citizenship- Field research at the General Company for Vegetable Oils.
...Show More Authors

The research aims to determine the role of the practices of green human resources management in achieving requirements of environmental citizenship in the workplace, the General Company for Vegetable Oils was chosen for the application of field-side of research which represent one of the important industrial companies in Iraq, which suffers from poor Green human resources management applications, which reflected negatively on the development Environmental citizenship among Employees. The questionnaire use as a tool to collect data and information as well as field presence of the researcher, The research sample included (30) managers of departments and Division ,and through using statistical program (SPSS) the data has been analys

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Al–bahith Al–a'alami
Political Use of the Photograph: A Semiotic Study of the Photograph of Al-Kadhimi's Visit to Fallujah on the Anniversary of the Victory Over ISIS
...Show More Authors

The research aims to determine what a photograph intends to convey as a visual text. Photographs are not captured randomly, especially those of politicians. Each photograph carries a message, even if interpretations of that message vary from person to person. The research adopts a methodology based on semiotic analysis, applying Laurent Gervero's model to analyze a photograph of the Iraqi Prime Minister Mustafa Al-Kadhimi's visit to Fallujah on the anniversary of the victory over ISIS. The photographs in question constitute a visual language built upon a sequence of iconic symbols and signs. These elements coalesce to give rise to an image centered around a particular theme, one designed to convey a precise messag

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Journal Of Photochemistry And Photobiology A: Chemistry
Facile assembly of CoS/Ag2MoO4 nanohybrids for visible light-promoted Z-type-induced synergistically improved photocatalytic degradation of antibiotics
...Show More Authors

View Publication
Scopus (39)
Crossref (33)
Scopus Clarivate Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Multiwavelet and Estimation by Interpolation Analysis Based Hybrid Color Image Compression
...Show More Authors

Nowadays, still images are used everywhere in the digital world. The shortages of storage capacity and transmission bandwidth make efficient compression solutions essential. A revolutionary mathematics tool, wavelet transform, has already shown its power in image processing. The major topic of this paper, is improve the compresses of still images by Multiwavelet based on estimation the high Multiwavelet coefficients in high frequencies sub band  by interpolation instead of sending all Multiwavelet coefficients. When comparing the proposed approach with other compression methods Good result obtained

View Publication Preview PDF
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A Study on the Accuracy of Prediction in Recommendation System Based on Similarity Measures
...Show More Authors

Recommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2024
Journal Name
Separation And Purification Technology
A comprehensive review on the use of Ti3C2Tx MXene in membrane-based water treatment
...Show More Authors

View Publication
Scopus (25)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Political Sciences Journal
The political dimension Engineering social characteristics and Alssayashllansan community
...Show More Authors

تستهدف هذه الدراسة وبشكل أساس، الكشف عن طبيعة وخصائص البعد السياسي لهندسة/صناعة الخصائص الاجتماعية والسياسية للإنسان والمجتمع، بوصفها العملية المسؤولة عن تصميم هذه الخصائص وصناعتها وتغييرها جزئيا أو كليا، دون أبعادها الأخرى المتعددة والمتنوعة، لا لمجرد الانسياق وراء دوافع الرغبة الذاتية، أو اعتبارات التخصص الدقيق وأحكامه، لأن معهما أيضا، بل وقبلهما أحيانا، دوافع واعتبارات أخرى موضوع

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 24 2024
Journal Name
Arab World English Journal
A Critical Discourse Analysis of Women’s Representation in Maysaloon Hadi’s Novel The Black Eyes
...Show More Authors

This study applies a discourse analysis framework to explore the portrayal of women in Maysloon Hadi’s novel (The Black Eyes) (2011), using Critical Discourse Analysis (CDA) and Norman Fairclough’s tri-dimensional model (1989) as the analytical foundation. It investigates the roles and challenges women face in the novel. While there is growing interest in the portrayal of women in literature, Iraqi literature—especially from the perspective of Iraqi women writers remains underexplored. Hadi’s *The Black Eyes* provides a unique case to examine this intersection. Despite the novel’s rich narrative, which offers insight into Iraqi women’s lives, there is a lack of comprehensive CDA to understand how its language constructs

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref