Preferred Language
Articles
/
jcolang-611
Basis of deconstruction in poetic text: بنەماكانی هەڵوەشاندنەوە لە دەقی شیعریدا
...Show More Authors

Deconstruction theory is a theory that appeared After construction theory, and it tends, through some key principles, to reach the purposive and the main meaning of the text by the means of different perspectives. In other words, deconstruction is a critical literary theory and a contemporary philosophical approach that work together to reach exact concept of the text, and this is achieved through reading and analyzing the text. Therefore, deconstruction has specified some principles so as to reach the exact meaning of the text through these different principles.

پێشەكی:

تیۆری هەڵوەشاندنەوە تیۆرێكە پاش بوونیادگەری سەریهەڵداوە و دەیەوێت لەڕێگەی چەند بنەمایەكی سەرەكیەوە كار بۆ گەیشتنە واتای مەبەستدار و سەرەكی دەق بكات، لە ڕێگەی گۆشە نیگای جیاوازەوە. بەواتایەكی تر هەڵوەشاندنەوە تیۆرێكی ئەدەبی ڕەخنەیی و ڕێبازێكی فەلسەفی هاوچەرخە و پێكەوە كاردەكەن لەپێناو گەیشتنە چەمكی تەواوی دەقەكە، ئەمەش لەڕێگەی خوێندنەوە و ڕاڤەی دەقەكەوە دەبێت،    بۆیە هەڵوەشاندنەوە چەند بنەمایەكی دیاریكردووە، تاوەكو لەڕێگەی ئەم بنەما جیاوازانەوە بگاتە واتای تەواوی دەق. 

       ئەم لێكۆڵینەوەیە پێكهاتووە لە دوو بەش، لە بەشی یەكەمدا باس لە چەمك و پێناسەی هەڵوەشاندنەوە و سەرهەڵدان و گەشەكردن و فەلسەفەی ئامادە و بنەما و ستراتیژەكانی هەڵوەشاندنەوە لە ڕوانگەی دریداوە كراوە.

      لە بەشی دووەمدا بەپێی بنەماو ستراتیژەكانی هەڵوەشاندنەوە كار لەسەر دەقی شیعری كراوە و دەقی شیعری (تەلیسم)ی ئەنوەر قادر جاف وەك نموونە وەرگیراوە.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 23 2011
Journal Name
International Journal Of The Physical Sciences
Fast prediction of power transfer stability index based on radial basis function neural network
...Show More Authors

View Publication
Scopus (16)
Crossref (4)
Scopus Crossref
Publication Date
Mon Dec 22 2025
Journal Name
Al-esraa University College Journal For Medical Sciences
Genetic Basis of Diabetic Retinopathy: Uncovering Molecular Links and Risk Factors—A Review Article
...Show More Authors

Genetics play a major role in diabetic retinopathy DR, which is a leading cause of blindness worldwide. Although the factors such as how long a person has had diabetes and high blood sugar are important, the wide variation and progression of DR indicates to a clear genetic influence. Early studies focusing on a few candidate genes (such as VEGF) produced conflicting and population-dependent results. This confirmed the multifactorial nature of the disease and the limitations of small-scale studies. Conversely, genome wide association studies (GWAS) have provided more consistent findings in detection a new genes related to DR. For example, rs2239785 variant which is located in the APOL1 gene was found to be a high risk factor for diabetic mac

... Show More
View Publication
Crossref
Publication Date
Fri Aug 22 2025
Journal Name
Full Text Book Of Xv. International Scientific Congress Of Pure, Applied And Technological Sciences
Full Text Book of Minar Congress15
...Show More Authors

One of the crucial public health problems worldwide is the urinary tract infections (UTIs) that are derived from uropathogenic bacteria (UPBs). Slime layer is known to have the ability to permit bacteria to achieve smooth surfaces attachment like catheters and prosthetic implants which in turn, facilitate biofilm formation and may cause lethal infections. On the other hand, Extended-spectrum beta-lactamase (ESBL) production is considered a growing concern among UPBs due to the limiting of the treatment options and contributes to resistance toward antibiotics. The principal study's point is the finding out the slime layer and ESBL production in Escherichia coli and Klebsiella pneumoniae of uropathogenic origin. Ten ready isolates (five isola

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Fri Nov 01 2019
Journal Name
2019 1st International Informatics And Software Engineering Conference (ubmyk)
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
...Show More Authors

In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of The College Of Languages (jcl)
Le Français dans le contexte irakien
...Show More Authors

L'ouverture des frontières et la mondialisation des échanges,comme les projets de l'intégration font de la connaissance de langue un enjeu essentiel ,professionnel et culturel,pour le citoyen de demain.

L'Irak est un pays Anglophone où domine l'anglais,le français est considérée comme deuxième langue étrangère en Irak.

Notre mini-mémoire se compose de deux parties.Dans la première partie nous essayons d'examiner la place du français en Irak qui nous dirige à savoir pourquoi on apprend le français en Irak et qui l'apprend?Est –ce qu'il y a une coopération française?

Dans la deuxième partie nous examinons les problèmes du français en Ir

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 07 2025
Journal Name
دار السرد للطباعة والنشر والتوزيع
علم النفس السريري الاسس,التشخيص,اساليب التدخل,والتحديات المعاصرة
...Show More Authors

في عصر يتعاظم فيه الحاجة إلى الاستماع العميق وفهم جوهر الروح الإنسانية أكثر من أي زمن مضى، يبرز هذا الكتاب كدليل يكتشف رحلةً شاملةً تعكس علم النفس السريري، الذي يُعد الجسر الفاصل بين التعقيدات الجسيمة للعقل البشري ومتطلبات عالم متغير. يستعرض الكتاب، من خلال فصول مترابطة، الأسس النظرية والتطبيقات العملية لهذا العلم، بدءًا من تشخيص الاضطرابات النفسية باستخدام أحدث الأدوات التشخيصية مثل - DSM و 111CD ، مرورًا بمن

... Show More
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Theoretical And Applied Information Technology
Graph based text representation for document clustering
...Show More Authors

Advances in digital technology and the World Wide Web has led to the increase of digital documents that are used for various purposes such as publishing and digital library. This phenomenon raises awareness for the requirement of effective techniques that can help during the search and retrieval of text. One of the most needed tasks is clustering, which categorizes documents automatically into meaningful groups. Clustering is an important task in data mining and machine learning. The accuracy of clustering depends tightly on the selection of the text representation method. Traditional methods of text representation model documents as bags of words using term-frequency index document frequency (TFIDF). This method ignores the relationship an

... Show More
Preview PDF
Scopus (15)
Scopus
Publication Date
Thu Dec 31 2020
Journal Name
College Of Islamic Sciences
The Epistemological The Epistemological Foundations for Comparison of Religions by al-Amiri: The Epistemological Foundations for Comparison of Religions by al-Amiri
...Show More Authors

 

 Research topic: (The Epistemological Foundations for Comparison of Religions by al-Amiri)

The research sought to study the topic with: a descriptive methodology by investigating the components of al-Amiri's approach to the interfaith comparison. And analytical, by showing the applied perception of an objective model in the comparison of religions to answer two questions: What are the cognitive foundations of al-Amiri? And what is his approach to establishing an objective comparison between religions?

The research started by introducing Abu al-Hassan al-Amiri, and then presented four topics: An introduction to al-Amiri's efforts in the interfaith comparison, his knowledge foundations, an applied model

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More