The advent of UNHCR reports has given rise to the uniqueness of its distinctive way of image representation and using semiotic features. So, there are a lot of researches that have investigated UNHCR reports, but no research has examined images in UNHCR reports of displaced Iraqis from a multimodal discourse perspective. The present study suggests that the images are, like language, rich in many potential meanings and are governed by clearly visual grammar structures that can be employed to decode these multiple meanings. Seven images are examined in terms of their representational, interactional and compositional aspects. Depending on the results, this study concludes that the findings support the visual grammar theory and highlight the value of images as semiotic resources in conveying multi-layered meanings. Applying Kress and Van Leeuwen"s (2006) Multimodal Discourse Analysis (MDA) of analyzing the images in UNHCR reports on the displaced Iraqis succeed in revealing their semiotic structures. The analysis of the selected images shows various relations existed between the participants and the viewers on the visual level through employing different visual modes.
يتنامى يوما بعد يوم استخدام السيارات وتتعاضم اعدادها ، فهذا هو عصر السرعة، وخاصة في مجال النقل والمواصلات، والتي تتحقق باستخدام وسائل النقل المختلفة ومن بينها السيارات، وبالتالي اصبحت هذه الوسيلة ضرورية لتحقيق هذه السرعة ومن ضرورات الحياة في انجاز الاعمال.
وتتبارى مصانع السيارات فيما بينها لانتاج انواع السيارات بمواصفات عالية من المتانة والامان والراحة، وفي ذات الوقت اصبحت هندسة الطرق
... Show Moretock markets changed up and down during time. Some companies’ affect others due to dependency on each other . In this work, the network model of the stock market is discribed as a complete weighted graph. This paper aims to investigate the Iraqi stock markets using graph theory tools. The vertices of this graph correspond to the Iraqi markets companies, and the weights of the edges are set ulrametric distance of minimum spanning tree.
The purpose of this paper is to investigate Religious Human Rights Violations. Religious liberty is essential for everyone, everywhere. Because religion is significant to everyone, everywhere. Humans are religious by nature. Our nature drives us to seek answers to deep questions about ultimate things. We cannot live a fully human life unless we are free to seek those answers and live according to the truths we discover. In this study, the researcher used Marsh and White model for analysis A sample of an offensive image of an Islamic concept from the book "Mohammad believes it or else." this book is a comic book written by pseudonym Abdullah Aziz and published by Crescent Moon Publishing company. The book is marked with anti- Mohammad, preju
... Show MoreIn this work, an experimental analysis is made to predict the thermal performance of the natural-convection phenomenon from a heated vertical externally finned-tube to surrounding air through an open-ended enclosure. Two different configurations of longitudinal rectangular fin namely, continuous and interrupted are utilized with constant thickness, different numbers, and different heights are extended radially on the outer surface of a heated tube. The tube is heated electrically from inner surface with five varied power input magnitudes. The effect of fins configuration, fins number, fins height, and heat flux of the inner tube surface on the thermal performance of natural c
... Show MoreThis article aims to provide a bibliometric analysis of intellectual capital research published in the Scopus database from 1956 to 2020 to trace the development of scientific activities that can pave the way for future studies by shedding light on the gaps in the field. The analysis focuses on 638 intellectual capital-related papers published in the Scopus database over 60 years, drawing upon a bibliometric analysis using VOSviewer. This paper highlights the mainstream of the current research in the intellectual capital field, based on the Scopus database, by presenting a detailed bibliometric analysis of the trend and development of intellectual capital research in the past six decades, including journals, authors, countries, inst
... Show MoreThe analysis of the classic principal components are sensitive to the outliers where they are calculated from the characteristic values and characteristic vectors of correlation matrix or variance Non-Robust, which yields an incorrect results in the case of these data contains the outliers values. In order to treat this problem, we resort to use the robust methods where there are many robust methods Will be touched to some of them.
The robust measurement estimators include the measurement of direct robust estimators for characteristic values by using characteristic vectors without relying on robust estimators for the variance and covariance matrices. Also the analysis of the princ
... Show MoreThe paper aims is to solve the problem of choosing the appropriate project from several service projects for the Iraqi Martyrs Foundation or arrange them according to the preference within the targeted criteria. this is done by using Multi-Criteria Decision Method (MCDM), which is the method of Multi-Objective Optimization by Ratios Analysis (MOORA) to measure the composite score of performance that each alternative gets and the maximum benefit accruing to the beneficiary and according to the criteria and weights that are calculated by the Analytic Hierarchy Process (AHP). The most important findings of the research and relying on expert opinion are to choose the second project as the best alternative and make an arrangement acco
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More