Lynn Nottage's Ruined, a Pulitzer Prize play, tackles the plight of women’s survival during the civil war in the Democratic Republic of Congo. The play is a loud scream for the whole world to view the physical violence of women and hear their traumatic memories, hoping that this attempt might save them from their disastrous lives resulting from the brutalities of civil war. In this play, women are portrayed beyond victims of the political and armed conflicts as they serve as a reflection of a serious issue that threatens the human race in general: the continuing dehumanization whereby women are considered minorities and the “others,” even within their own society. By applying a critical analysis technique, the current paper ai
... Show MorePauses as pragmatic markers are considered important devices that help readers to gain a better and deeper understanding of certain texts as well as speech, promoting effectively language communication. They can help both the speaker and the hearer, due to the functions they have in a text. Their occurrence in speech has a value that they make it more understandable. In this regard, the present study aims to examine the forms and functions of pauses in literary texts, more specifically, in selected extracts from two dramas, namely, Pinter's The Homecoming and Baker's Circle Mirror Transformation and to compare how the two writers use pauses in these two dramas. To do so, the sequential production approach of turn-taking by Sacks, Sc
... Show More.
The issue of peace, renunciation of violence, and acceptance of the other is one of the vital issues that rose to the top of the list of priorities at the end of the last century and the beginning of the new millennium of the conscience of the Iraqi people by spreading the culture of peace. In this context, we seek during this research to identify the concept of the culture of peace and its impact on sustainable development, and to draw a set of results and suggestions to consolidate this culture in our Iraqi society as an obligation of sustainable development.
استهدفت الدراسة الحالية تحديد طبيعة العلاقة الارتباطية بين التعاطف والسلوك العدواني لدى عينة من طلبة المرحلة المتوسطة. تكونت العينة من طلبة الصف الأول المتوسط بغداد/ تربية الرصافة الثانية من كلا الجنسين، شملت 218 طالباً وطالبة، وطبق مقياس التعاطف، ومقياس السلوك العدواني. وبعد معالجة البيانات، أظهرت النتائج تمتع طلبة الصف الأول المتوسط بالنزعة أو الميل للتعاطف، وتبين أن الإناث أكثر تعاطفاً من الذكور، ومستوى
... Show MoreThis study focuses on the impact of technology on creating a dystopian world as presented by the English playwright Caryl Churchill in her play A Number (2002). This dramatic work came as a reaction to the most crucial and valuable turning point in the scientific achievements of human engineering, namely, the cloning of the sheep called Dolly. Therefore, A Number is a play that presents an analytical stage for imagining the biotechnological and scientific future. This dramatic vignette captures the playwright’s fears towards the abnormal progress of technology and science and how far such technological progress affects human relationships and identity. It also portrays how technological progress results in the feeling of a lack of
... Show MoreModal verbs are also called auxiliary verbs, helping verbs and modal auxiliaries. They are special auxiliary verbs that express the degree /of certainty of the action in the sentence, attitude or opinion of the writer concerning the action. These auxiliary verbs are can, could ,may, might, must, ought to, shall, should, will, would and had better. Modality is one of the most difficult aspects of learning English, because the form of modals does not follow the conventional rules of grammar, and there are so many meanings of modals that students often get confused about which modal to use. Also, many EFL learners face difficulty in choosing the proper modal verb that fit certain situations because each modal verb has many functions. The pr
... Show MoreCognitive stylistics is one discipline of applied linguistics that relies on the reader’s interpretation and inference of the meaning of the text depending on his background knowledge. It studies how the reader understands the text and mapping it with his real experiences (Jeffries and McIntyre,2010). The present study is a cognitive stylistic analysis of digital stories. Digital stories are short narratives made by a combination of different sorts of digital media such as pictures, audios and videos. These digital media are employed to tell stories about oneself, famous people, and important events. The analyzed stories are selected from “Daily Yahoo Stories” and are analyzed according to Lakoff (1993) approach, The analysis investig
... Show Moreهدفت الدراسة إلى الكشف عن العالقة بين الخبرات الصادمة والسلوك الفوضوي لدى طلبة المرحلة المتوسطة فضال عن التعرف على الفروق بين الطلبة في الخبرات الصادمة والسلوك الفوضوي على وفق متغير النوع )الذكور- اإلناث(، تألفت عينة الدراسة من )185( طالباً وطالبة، وتم تطبيق مقياسا الدراسة على العينة- مقياس الخبرة الصادمة ومقياس السلوك الفوضوي وهما )من إعداد الباحثان(، وقد أسفرت نتائج الدراسة عن: - إن طلبة المرحلة المتوسطة أظهر
... Show MoreThe self-evident truth existing in today's business environment is the continuity of change and its continuity and turmoil, also its increase over time as it is more abundant, abundant, wide and complex than ever before, and it is the dominant feature in the business environment, as different organizations and operating units can find themselves shifting from the top to the bottom. And then it requires its departments to strive to adapt to these rapid and turbulent shifts and changes by bringing about a series of organizational and adaptive changes that are not limited to one organizational aspect only but rather include all organizational components. Accordingly, this research came to determine the readiness of public organizations to chan
... Show MoreThe problem of job burnout has become one of the main problems for researchers in social welfare organizations (social protection bodies) - one of the formations of the Ministry of Labor and Social Affairs. Its negative effects increased in light of the COVID-19 pandemic, and in light of the Corona pandemic, the pressures and burdens of workers varied, which resulted in high rates of anxiety, tension, and intellectual and physical exhaustion, and then negatively affected their efficiency in performing work at the individual and organizational level, especially after the increasing tasks of these Bodies in carrying out their role in achieving the general goals and objectives as beingThe general goals are that they are responsible for providi
... Show Moreهدفت الدراسة التعرف على الشفقة بالذات لدى الطلبة فضلا عن التعرف على الفروق في الشفقة بالذات وفق متغيرات : الجنس –التخصص الدراسي – المرحلة الدراسية، تالفت عينة الدراسة من (200) طالب وطالبة موزعين بالتساوي حسب الجنس (ذكور – اناث) والتخصص الدراسي (علمي - انساني) والمرحلة الدراسية ( الاولى - الرابعة )، وبعد تطبيق مقياس الدراسة وتحليل الاجابات احصائيا ، اظهرت النتائج ان الطلبة لديهم شفقة بالذات كما اظهرت النتائج عدم
... Show Moreهدف البحث التعرف على الملل الأكاديمي لدى طلبة المرحلة المتوسطة، فضلا عن التعرف على الفروق في الملل الاكاديمي على وفق متغير الجنس ومتغير الصف الدراسي، استخدمت الباحثة المنهج الوصفي، تكونت عينة البحث من ( 200) طالباً وطالبة تم اختيارهم بطريقة عشوائية وبعد تطبيق مقياس الملل الاكاديمي (من اعداد الباحثة) على عينة البحث وباستخدام الوسائل الإحصائية المناسبة توصلت نتائج البحث الى ان: طلبة المرحلة المتوسطة تعاني من ال
... Show MoreThe researchers in this study, which aimed to find out Degree contribution of Iraqi
women in development from the perspective faculty members of the complex Jadriya
University in Baghdad, and the the impact of demographic variables (gender, college, place of
living, school level,) for its contribution.
The study population consisted of some faculty members Jadiriyah compound in
Baghdad's University for the academic year 20012/2013. This study followed a descriptive
approach the field, and the analytical method, the study sample consisted of (250) teaching all
of College of Science for girls and education for girls, and to achieve objective of the study
was the development of a questionnaire, was sure of its sincer
Aggression is a negative form of an anti-social behavior. It is produced because of a particular reason, desire, want, need, or due to the psychological state of the aggressor. It injures others physically or psychologically. Aggressive behaviors in human interactions cause discomfort and disharmony among interlocutors. The paper aims to identify how aggressive language manifests itself in the data under scrutiny in terms of the pragmatic paradigm. Two British literary works are the data; namely, Look Back in Anger by John Osborne (1956), and The Birthday Party by Harold Pinter (1957). This paper endeavors to answer the question of how aggressive language is represented in literature pragmatically? It is hoped to be significant to
... Show MoreResults: The results summarized two goals, the first goal stipulates (to identify the degree of cyberbullying among academically outstanding students in the middle school stage). To achieve this goal, the researchers applied the research tool (electronic bullying scale) and then extracted the arithmetic mean for the sample of the current research, which amounted to (6.28) with a standard deviation of (4.03). Then the researchers applied the t-test for one sample to identify the significance of the differences between the means. The arithmetic mean for the sample and the hypothetical (theoretical) mean, which amounted to (11.5) degrees, and after applying the T-test for one sample, it was found that the calculated T-value, which amounted to
... Show MoreThe aims of visible watermarking are to prevent the illegal copying of videos and images and to avoid the theft and unauthorized advertisement of the legitimate owners' content. The visible watermark is distinguishable with the naked eye. This makes it easily removed by an attacker. This paper proposes an anti-removable visible logo by double embedding using the discrete wavelet transform (DWT) and a chaotic map. The main purpose of this method is to prevent the removal attack and restore the original video without information loss after the logo is legally removed. DWT is used for both the cover area and the logo to embed sub-bands of information from the cover area into sub-bands of the logo. The main idea of using a chaotic m
... Show More'Steganography is the science of hiding information in the cover media', a force in the context of information sec, IJSR, Call for Papers, Online Journal
This study aims at evaluating the performance of MA students in the College of Education for Women in using the digital transformation and identifying the significant difference in performance evaluation according to the variable of academic qualification (Master or PHD). In order to achieve the aim of the research the researcher prepared a questionnaire of 20 items, and this happens after the researcher's getting acquaintance of the literature of previous studies related to the variable of the research. The apparent validity of the items was examined by exposing them to 10 juries specialized in education, psychology and evaluation and measurement. The stability of the items was examined via two methods, the test-repetition and half-divisio
... Show Moreهدفت الدراسة إلى التعرف على الحيوية الذاتية فضلاً عن التعرف على الفروق في الحيوية الذاتية بين الطلبة على وفق متغير الجنس (ذكر – انثى) والمرحلة الدراسية (أول-رابع) والتخصص الدراسي (علمي-انساني)، تألفت عينة الدراسة من (120) طالبا وطالبة من طلبة الجامعة، وتم تطبيق مقياس الدراسة -مقياس (الحيوية الذاتية) وهو (من إعداد الباحثة)، وقد اسفرت نتائج الدراسة عن: - إن طلبة الجامعة يتمتعون بدرجة عالية من الحيوية الذاتية. - وجود ف
... Show Moreيعد الاهتمام بأصحاب الهمم مطلب ديني لجميع الأديان ومطلب اجتماعي لانهم جزء أساسي من المجتمع ينبغي ان يحصلوا على فرصتهم وحقوقهم كباقي افراد المجتمع، فضلا عن كونه مطلب تربوي، إذ يعاني التلاميذ أصحاب الهمم من مشكلات عديدة وذلك لا سباب ترجع لخصائصهم وصفاتهم الخاصة التي ولدوا بها أو اكتسبوها بعد الولادة لسبب من الأسباب، لذا نجدهم يعانون من صعوبات في اكتساب المهارات والخبرات الحياتية بصورة عامة والتعليمية بصورة
... Show Moreتبنت العديد من المؤسسات الأكاديمية التعلم الإلكتروني منذ سنوات ، وقد أثبت فاعليته في كثير من هذه المؤسسات لاسيما تلك المهتمة بتعلم اللغات الاجنبية. الا انه مع انتشار جائحة كورونا اصبح التعليم الالكتروني ضرورة ملحة في الجامعات في جميع أنحاء العالم ، بما في ذلك الجامعات العراقية. تهدف الدراسة الحالية إلى تقصي أثر هذا الوباء على التعلم الإلكتروني في أحدى الكليات العراقية . يفترض الباحث أن تقبل ال
... Show MoreVideo copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various
... Show MoreThis paper presents a 3D watermarking model based on the nearest distance between two vertices in mesh, where the embedding path moves as deep as possible until the embedding data is completed. The proposed algorithm achieved good results according to invisibility and robustness. The visibility was measured in term
of Root Mean Square Error (RMSE) and Hausdroff Distance (HD), which obtained good results. As related to robustness, the proposed method showed resistance to geometrical attack (translation, scaling and rotation) as well as acceptable resistance to signal processing attacks like noise addition and simplification.
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.