In the present paper, the researcher attempts to shed some light on the objective behind inserting some Qur'anic verses by Al-Zahraa (Peace Be Upon Her) in her revered speech. Besides, it tries to investigate the hidden meaning of these verses and to study them in the light of pragmaticreferences. This task is supported by Books of Tafseer as well as the books that explained this speech to arrive at its intended meaning. It is possible say that this is astep towards studying speeches of 'Ahlul Bayt' (People of the Prophet's household) in terms of modern linguistic studies, as well as employing modern methods to explore the aesthetic values of these texts.
Social media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acq
... Show MoreAbstract
Objective(s): To evaluate housekeeping services staff work environment and their health status, as well as to determine the impact of the work environment upon their health status.
Methodology: A descriptive design is employed throughout the present study to evaluate housekeeping services staff work environment and their health status, as well as to determine the impact of the work environment upon their health status from November 3rd 2017 to June 30th 2018. A purposive “nonprobability” sample of (101) housekeeping staff is selected for the present study. An instrument is constructed for the purpose of the study and it is consists of (2) parts: (I) Evaluation of work environment, and (II) Evaluation of housekeeping st
Bohemia AL-Kharab for Salah Salah Which contain 477Paper deal With History of Nathion This Novel Has a different styl from another IraQis Novels, this Novel has no conversation this is the basic reason Which hav this research .
The novel have 3 versions , the first one deal with explain the text in different ways , the second contains the realation ship between the text and the reader .
Which appear very clear in novel from up to down , whil the third one and the last explaine
The hermonologiq
The time bylose the relation in the novel.
The last thing is the conclusion which has the simple things conclude by the researcher from several readings to the novel
<
... Show MoreThe Qur'an was revealed with a clear Arabic tongue, and it seized minds, and was astonished by its eloquence and eloquence of tastes, so it was a new dawn, and a nucleus for the birth of a new literature inspired by the tolerant thought of Islam, its fresh words, and its delicate and revealing meanings
News headlines are key elements in spreading news. They are unique texts written in a special language which enables readers understand the overall nature and importance of the topic. However, this special language causes difficulty for readers in understanding the headline. To illuminate this difficulty, it is argued that a pragmatic analysis from a speech act theory perspective is a plausible tool for a headline analysis. The main objective of the study is to pragmatically analyze the most frequently employed types of speech acts in the news headlines covering COVID-19 in Aljazeera English website. To this end, Bach and Harnish's (1979) Taxonomy of Speech Acts has been adopted to analyze the data. Thirty headlines have been collected f
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.