Preferred Language
Articles
/
jcoeduw-1362
Schema Theory and Text- worlds: A Cognitive Stylistic Analysis of Selected Literary Texts
...Show More Authors

Cognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections.       

Schema and text world theories are useful tools in cognitive stylistic studies. The reader's perception of a particular text world depends on her/his existing schema during the process of interpretation. The selected texts for the study are "Strange Meeting" by Wilfred Owen, "In Winter" by Corbett Harrison and the opening passage of David Lodge's novel Changing Places which are intended to show how the two theories can be integrated to account for the way in which text worlds are perceived. So as a result, readers start establishing meaning based on their schemata and these meanings change through adding a new one. The cognitive ability to understand literary texts and how readers build mind worlds is a crucial aim in cognitive poetics. An in-depth cognitive stylistic analysis reveals significant points about reading and interpreting the selected literary texts by providing a way of thinking about background knowledge and how the individual's experience would influence their interpretation and viewing of the  text world.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Comparison between Rowatinex and Tamsulosin as a Medical Expulsion Therapy for Ureteral Stone
...Show More Authors

The objective of this study is to evaluate the efficacy and safety of rowatinex and tamsulosin in the treatment of patients with ureteric stone.

Forty patients with ureteric stone ranged (4- 12) mm, were included in this study. They were randomized into two groups where the first group includes twenty patients treated with Rowatinex three times daily (Group 1), and the second group includes twenty patients treated with tamsulosin 0.4mg/day (Group 2). All patients were randomly assigned to receive the designed standard medical therapy for a maximum of 3 weeks.

Each group was given an antibiotic as prophylaxis and an injectable non-steroidal anti-inflammatory drug used on demand. At the outpatient clinic all subjects were a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 02 2013
Journal Name
Iraqi Medical Journal
Etiology and Antibiotic Sensitivity for Otitis Media in A Central Pediatric Teaching Hospital.
...Show More Authors

Publication Date
Thu Jun 01 2017
Journal Name
Applied Nursing Research
Examining perceived and actual diabetes knowledge among nurses working in a tertiary hospital
...Show More Authors

View Publication
Scopus (30)
Crossref (31)
Scopus Clarivate Crossref
Publication Date
Tue Jan 02 2024
Journal Name
Medical Oncology
COX 2-inhibitors; a thorough and updated survey into combinational therapies in cancers
...Show More Authors

View Publication
Scopus (29)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Mon Apr 07 2025
Journal Name
The Peerian Journal
Plant-Bacterial Interactions: A latent Alliance for Growth promotion and Environmental Stress Tolerance
...Show More Authors

This encapsulates the general relationship between plant and bacteria in the natural and agricultural ecosystem. It is based on the activities of useful bacteria, such as plant growth-promoting bacteria (PGPRs) and nitrogen-fixing bacteria, in promoting plant growth and plant tolerance to stressful situations regarding pollution, salinity, and drought. The article also mentions that the bacteria maintain plant health by secretion of phytohormones, nitrogen fixation, solubilization of phosphate, and production of antibiotics against pathogenic bacteria. The article also mentions the existing applications of the interaction in sustainable agriculture and bioremediation of contaminated soils.

View Publication Preview PDF
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
2023 Ieee 36th International Symposium On Computer-based Medical Systems (cbms)
Toward a Minimal sEMG Setup for Knee and Ankle Kinematic Estimation during Gait
...Show More Authors

View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref