Preferred Language
Articles
/
rxgt-ZQBVTCNdQwCOCMd
Investigating Ideologies of Women Empowerment in Amy Poehler`s Moxie (2021): A Critical Stylistic Approach
...Show More Authors

Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 18 2023
Journal Name
International Journal Of Development In Social Sciences And Humanities
A CRITICAL DISCOURSE ANALYSIS OF SELECTED POLITICAL SPEECH ON ONLINE EDUCATION
...Show More Authors

PDBN Rashid, International Journal of Development in Social Sciences and Humanities, 2023

View Publication
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of The College Of Languages (jcl)
A Critical Discourse Analysis of the 2012 American Presidential Election Debates
...Show More Authors

This study discusses the Critical Discourse Analysis of 2012 American Presidential Election Debate’. The researcher adopts a model proposed by Van Dijk’s (2006 d). Six ideological categories have been selected within the overall strategies of the ideological square are used. The categories are of three levels of discourse structure : (the meaning, the argumentation, and the rhetoric) .They have shown effective criteria for detecting the most disguised systems of racism and manipulation.

            Based on the analysis, it can be concluded that the elite discourses of candidates contribute to the reproduction of domination, Orientalism, and Islamophobia. This can be appl

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 15 2022
Journal Name
Arab World English Journal
Investigating Teachers of English Knowledge and Awareness of Dyslexia: A case study in Primary Iraqi Schools
...Show More Authors

Dyslexia is a learning disability in which people face difficulty reading though they are intelligent and have motivation for reading. Therefore; it impacts the portion of the brain responsible for processing language. Such a condition compromises the learning efficiency of the affected person, which generally gets unnoticed. Even affected children are unaware of their state. The study investigates the knowledge and awareness of dyslexia among teachers of English in Iraqi primary schools. this study has three objectives: (i) To investigate the amount of awareness and knowledge among the primary school teachers of English in Baghdad City about dyslexia.; (ii) To examine how English teachers’ awareness of dyslexia is affected by the

... Show More
View Publication
Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Materials Today: Proceedings
Investigating the use of lean manufacturing techniques in liquid batteries production: A field research in Babylon plants
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Mon Jul 03 2023
Journal Name
College Of Islamic Sciences
A critical methodological study in abrogative,abrogated, in a book of (Zad AlTafseer) in Surah Al-Baqara in the holy Quraan.
...Show More Authors

This research is a critical methodological  study deals with some Quranic verses abrogative,abrogated.

by Ibn al-Jawzi (may Allah have mercy on him) in his book (Tafseer Zad al-Maseer) inin Surah Al-Baqara the  in the holy Quraan.

View Publication Preview PDF
Publication Date
Wed Nov 22 2023
Journal Name
Nasaq Journal
The language of diplomats in modern Russian (stylistic and educational aspect(
...Show More Authors

This article is devoted to the stylistic and educational characteristics of the language of Russian diplomacy. The article describes the stylistic and educational aspect of the appearance of the Russian protocol, its relation to universal diplomacy, the relationship between the diplomatic language and the business sub-style. Here the semantic features of the diplomatic vocabulary are determined and the factors influencing its formation and the emergence of new terms in the language of Russian diplomacy are considered. The article also examines the national and cultural identity of the language of Russian diplomacy, provides rules for drafting diplomatic documents and conducting negotiations, defines the concept of a document as a whole, giv

... Show More
Publication Date
Wed Mar 30 2022
Journal Name
Iraqi Journal Of Science
s-Compressible and s-Prime Modules
...Show More Authors

   Let R be a ring with identity and Ą a left R-module. In this article, we introduce new generalizations of compressible and prime modules, namely s-compressible module and s-prime module. An R-module A is s-compressible if for any nonzero submodule B of A there exists a small f in HomR(A, B). An R-module A is s-prime if for any submodule B of A, annR (B) A is small in A. These concepts and related concepts are studied in as well as  many results consist properties and characterizations are obtained.  

View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jan 03 2017
Journal Name
Al- Ustath: Quarterly Scientific Journal
A Linguistic Analysis of Halliday's Systemic- Functional Theory in Political Texts
...Show More Authors

BN Rashid, AKF Jameel, Al- Ustath: Quarterly Scientific Journal, 2017 - Cited by 15

View Publication
Publication Date
Sat Jan 01 2022
Journal Name
3rd International Scientific Conference Of Alkafeel University (iscku 2021)
Investigations for the critical vehicle velocities on a curved path
...Show More Authors

􀀨􀀅􀀆􀀔􀀜􀀄􀀂􀀆􀀈􀀓􀀌􀀩􀀏􀀆􀀉􀀅􀀆􀀉􀀅􀀉􀀚􀀝􀀔􀀄􀀗􀀉􀀚􀀆􀀂􀀓􀀚􀀁􀀔􀀄􀀓􀀅􀀆􀀄􀀂􀀆􀀔􀀓􀀆􀀃􀀂􀀔􀀄􀀟􀀉􀀔􀀃􀀆􀀔􀀜􀀃􀀆􀀛􀀃􀀜􀀄􀀗􀀚􀀃􀀆􀀗􀀌􀀄􀀔􀀄􀀗􀀉􀀚􀀆􀀂􀀘􀀃􀀃􀀊􀀂􀀆􀀓􀀖􀀆􀀓􀀛􀀃􀀌􀀔􀀁􀀌􀀅􀀄􀀅􀀕􀀢􀀆􀀪􀀜􀀃􀀆􀀄􀀅􀀛􀀃􀀂􀀔􀀄􀀕􀀉􀀔􀀄􀀓􀀅􀀂􀀆 􀀉􀀌􀀃􀀆􀀙􀀉􀀂􀀃􀀊􀀆􀀓􀀅􀀆􀀉􀀁􀀔􀀓􀀟􀀓􀀙􀀄􀀚􀀃􀀆􀀚􀀉􀀔􀀃􀀌􀀉􀀚􀀆􀀂􀀘􀀉􀀗􀀃􀀆􀀟􀀄􀀊􀀂􀀔􀀆􀀔􀀜􀀃􀀆􀀗􀀃􀀅􀀔􀀃􀀌􀀚􀀄􀀅􀀃􀀂􀀆􀀓􀀖􀀆􀀔􀀜􀀃􀀆􀀙􀀉􀀂􀀃􀀆

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref