Lexicography, the art and craft of dictionary-making, is as old as writing. Since its very early stages several thousands of years ago, it has helped to serve basically the every-day needs of written communication among individuals in communities speaking different languages or different varieties of the same language. Two general approaches are distinguished in the craft of dictionary-making: the semasiological and the onomasiological. The former is represented by usually-alphabetical dictionaries as such, i.e. their being inventories of the lexicon, while the latter is manifested in thesauruses. English and Arabic have made use of both approaches in the preparation of their dictionaries, each having a distinct aim ahead. Within the confines of each language, an approach may yield various trends as to, for instance, the arrangement of entries within a dictionary. The present paper aims at distinguishing the various trends in writing dictionaries in both English and Arabic. By so doing, it is hoped that the bases on which variation has relied are arrived at in order to provide the appropriate explanations of how and why differences have followed. To achieve this aim, an expository critical account of the approaches to the compilation of monolingual dictionaries in English and Arabic is presented; reference to bi-lingual dictionaries is going to be made appropriately, however. These trends, or schools, within each approach followed a certain system in compiling its representative dictionaries.
This paper deals with a central issue in the field of human communication and reveals the roaming monitoring of the incitement and hatred speech and violence in media, its language and its methods. In this paper, the researcher seeks to provide a scientific framework for the nature of the discourse of incitement, hatred speech, violence, and the role that media can play in solving conflicts with their different dimensions and in building community peace and preventing the emergence of conflicts among different parties and in different environments. In this paper, the following themes are discussed:
The root of the discourse of hatred and incitement
The nature and dimensions of the discourse of incitement and hatred speech
The n
The aim of this paper is to shed the light on the concepts of agency theory by measuring one of the problems that arise from it, which is represented by earnings management (EM) practices. The research problem is demonstrated by the failure of some Iraqi banks and their subsequent placement under the supervision of the Central Bank of Iraq, which was attributed, in part, to the inadequacy of the agency model in protecting stakeholders in shareholding institutions, as well as EM, pushed professional institutions to adopt the corporate governance model as a method to regulate the problem of accounting information asymmetry between the parties to the agency. We are using the Beneish M-score model and the financial analysis equations in
... Show MoreWith a descriptive and analytical approach, it discusses the concept of phenomenology as an approach to seeing the aesthetics of ugliness as one of the concepts associated with the aesthetic experience in contemporary art designs, as it is the result of communication between artistic production and the recipient, which leads to creating a state of aesthetic pleasure. A phenomenological method is used to uncover the aesthetics of ugly and to connect ugliness and beauty since ugliness in aesthetics incorporates beauty as a modern aesthetic vision from the phenomenological perspective. The study investigated aesthetics as a phenomenon of perception, sensory knowledge, and the aesthetic response to the production of designs in contemporary a
... Show MoreThe aim of the research is to identify the suitability of a patrol model in evaluating the financial performance of Iraqi banks. The financial reports of five Iraqi commercial banks were approved as a sample for research for the period from 2015 to 2020. The most common financial ratios were adopted for the purpose of measuring the five elements of the model, which are capital adequacy, profitability, credit risk, bankal efficiency and liquidity. The results showed the possibility of using the PATROL model in evaluating the performance of Iraqi banks, as it gave a realistic image of the reality of Iraqi banks in terms of high capital adequacy index and high liquidity, as well as fluctuation in profitability index, not to mention the prob
... Show MoreThe present study aimed to investigate the acetamiprid effects on biochemical aspects in albino mice. Thirty albino mice at the age of 6-8 weeks and average weight 25±5 g were divided into three groups each having ten (10) healthy mice. The first group was orally administrated with distilled water while the second and third groups were orally administrated with 50 mg/mL and 100 mg/mL respectively of acetamprid (0.1 mL) daily for one week. LD50 of acetamiprid was measured and found to be 200 mg/kg. The parameters of evaluations included liver function using Aspartate Aminotransferase (AST), Alanine Aminotransferase (ALT) and Alkaline Phosphatase (ALP). Lipid profile was anal
... Show MorePurpose: The study aims to investigate the extent to which material and non-material requirements are available in applying budgeting programs and performance in Iraqi governmental companies that are not aimed at achieving profits. whose activities are limited to providing services of public interest. This is done by studying the extent to which the requirements of each stage of preparing the programs and performance budget can be met. Theoretical framework: The process of evaluating financial performance is the main objective of all economic units, whether they are governmental or private economic units. Budgets contribute to the evaluation process by analyzing deviations in the application. The study includes an analytical pres
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.