Cognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections. Schema and text world theories are useful tools in cognitive stylistic studies. The reader's perception of a particular text world depends on her/his existing schema during the process of interpretation. The selected texts for the study are "Strange Meeting" by Wilfred Owen, "In Winter" by Corbett Harrison and the opening passage of David Lodge's novel Changing Places which are intended to show how the two theories can be integrated to account for the way in which text worlds are perceived. So as a result, readers start establishing meaning based on their schemata and these meanings change through adding a new one. The cognitive ability to understand literary texts and how readers build mind worlds is a crucial aim in cognitive poetics. An in-depth cognitive stylistic analysis reveals significant points about reading and interpreting the selected literary texts by providing a way of thinking about background knowledge and how the individual's experience would influence their interpretation and viewing of the text world.
In probability theory generalizing distribution is an important area. Several distributions are inappropriate for data modeling, either symmetrical, semi-symmetrical, or heavily skewed. In this paper, a new compound distribution with four parameters called Marshall Olkin Marshall Olkin Weibull (MOMOWe) is introduced. Several important statistical properties of new distribution were studied and examined. The estimation of unknown four parameters was carried out according to the maximum likelihood estimation method. The flexibility of MOMOWe distribution is demonstrated by the adoption of two real datasets (semi-symmetric and right-skewed) with different information fitting criteria. Su
هدف البحث إلى بناء مقياسين تخصصين للنزاعات اللاشعورية وحرية الإرادة لمدربي بعض ألعاب القوى والتعرف على مستوى كل منهما لديهم، وإعداد برنامج إرشادي نفسي مستند لرفع مستوى الحالات اللاشعورية وحرية الإرادة للمدربين الذين يعانون من انخفاض مستوى النزاعات اللاشعورية وحرية الإرادة، والتعرف على تأثير البرنامج الإرشادي نفسي في النزاعات اللاشعورية وحرية الإرادة لدى مدربي بعض ألعاب القوى، لتفترض بذلك الباحثة بإ
... Show MoreThis research aims to identify the cognitive distortion of kindergarten children and its relationship to their parenting reinforcement. The researcher used the descriptive approach, being the closest to reaching the study objectives, To measure the relationship between the research variables, the researcher prepared two questionnaire tools for this purpose, the first for measuring "cognitive distortion", And the second is to measure "parental reinforcement", and each tool consisted of (20) items.
After ensuring the validity and reliability of the two research tools and their suitabi
... Show MoreThe present study aims at examining the stylistic development in the crafts of the sculptor Mohammed Ghani Hikmat. It gives answers to the following two questions: what is the nature of the stylistic development? And what are these principles and techniques led him to this development? The researcher has used the descriptive, analytic approach in examining the selected five samples out of the sculptor’s displayed crafts. The observational technique is used as a tool of examination. Among the main findings are: integrating space in the cubic crafts, represented by the existence of holes within this general construction of that space; the evident influence of critical contemporary orientations through the direct insertion of recipients i
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreIt is doubtless that the sexual place has some common indicators due to the masculine and feminine bodies which may be natural or deviated (homosexual). The female has an act of voice in the imaginary masculine place whereas the male has an act of image recognized in the parental mind in both the secular and sacred place. Those places create different limits and perceptions according to the auditory and visual readings in search of identity, text and body in the feminine dramatic text.
The research includes four chapters; the first, the methodological framework, involves the problem which is centralized in the following enquiry: What is the relationship between the place and the term of
... Show MoreAdvances in digital technology and the World Wide Web has led to the increase of digital documents that are used for various purposes such as publishing and digital library. This phenomenon raises awareness for the requirement of effective techniques that can help during the search and retrieval of text. One of the most needed tasks is clustering, which categorizes documents automatically into meaningful groups. Clustering is an important task in data mining and machine learning. The accuracy of clustering depends tightly on the selection of the text representation method. Traditional methods of text representation model documents as bags of words using term-frequency index document frequency (TFIDF). This method ignores the relationship an
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreThe goal of this research is to find the effects of both the studying students groupwhich has various educational levels and the integration of the fragmented information through or during the study of history subjects for the female students of the fifth secondary literary section.
To achieve this study or case the researcher has chosen an experimental design or test by studying three groups: two are as mentioned above and the third is just ordinary team. In addition to that, there is a test after the experiment. The researcher chose on purpose female students of the literal section from two different secondary school Al Asil and Wahran both are secondary school for girls, and both are from directorate of education- Al Karkh 2nd dist
This research basically gives an introduction about the multiple intelligence
theory and its implication into the classroom. It presents a unit plan based upon the
MI theory followed by a report which explains the application of the plan by the
researcher on the first class student of computer department in college of sciences/
University of Al-Mustansiryia and the teacher's and the students' reaction to it.
The research starts with a short introduction about the MI theory is a great
theory that could help students to learn better in a relaxed learning situation. It is
presented by Howard Gardener first when he published his book "Frames of
Minds" in 1983 in which he describes how the brain has multiple intelligen