Preferred Language
Articles
/
2Bf5EZMBVTCNdQwCdMWx
Dylan Thomas:The vision of Death as a Prologue to a New Life
...Show More Authors

Dylan Thomas (1914-1953) is a modern poet belongs to the apocalyptic movement of the 1940's.This movement is influenced by the doctrines and techniques of surrealism. Poetry for him should not be primarily concerned with man in society, but with the celebration of spiritual truth. It should bring to light the hidden causes, hence his personal interest is to strip darkness and explore the inward motives. To do this he uses a cluster of images: a constant building up and breaking down of images. His poetry depends on the romantic spontaneity, suggestiveness of the Symbolists and the the surrealists' mysterious liberation of the unconsciousness and the emotional involvement in the dynamics of life. In "Light Breaks Where No Sun Shine" ( 1934) Thomas celebrates a rejection of the idea of death. Man lives eternally in the forms of nature. Thus death bears with it a sense of entrance rather than exit. In the "winter's Tale" death is the resurrection, a necessary step for the physical and spiritual regeneration. Dylan Thomas (1914- 1953) came from the rural Swansea in Wales, bohemianism, alcoholism and freakiness made him the controversial topic in London's literary circles; generally he is regarded as an eccentric.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 04 2010
Journal Name
Journal Of Educational And Psychological Researches
Educational Curricula of preeminent and Talent:Enrichment Curriculum as a Model
...Show More Authors

This research aimed at recognizing the properties of curricula that fitted to preeminent and talent students. Many types of these curricula were exposed, enrichment curriculum was explained as one of alternatives of available curricula.
The research used the analytical methodology for local and international literature in the field of preeminent and talent education to meet the properties of curricula that fitted to this special group of students. Many results was obtained as:
• This type of school enrichment curriculum consists of three levels( general discovery activities, individual and groups training activities, and individual or groups real problems).
• Investigation the effectively both sides of brain: right and left,

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
2015 37th Annual International Conference Of The Ieee Engineering In Medicine And Biology Society (embc)
Tsallis entropy as a biomarker for detection of Alzheimer's disease
...Show More Authors

View Publication
Scopus (34)
Crossref (21)
Scopus Crossref
Publication Date
Tue Jun 11 2019
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Preparation and Characterization of Etodolac as a Topical Nanosponges Hydrogel
...Show More Authors

Nanosponges (NS) of etodolac(ETO) was prepared using the emulsion solvent diffusion method ; the effects of drug: polymer ratio, the effect of level concentration of internal phase and stirring time and other variables that effect on the physical characteristics of NS were investigated and characterized, The selected formula was lyophilized then incorporated into hydrogel ; which also evaluated .The results show that the formulation that contain Drug: PVA:EC in ratio 1:3:2 is the best with smallest particle size 40.2±0.098 with polydispersibility0.005 and in vitro release 97.6±0.11%, , ETO NS Carbopol hydrogel produced a significant(p<0.05) improvement of the in vitro release than pure ETO hydrogel.

View Publication Preview PDF
Scopus (18)
Crossref (11)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Animal Nutrition And Feed Technology
Insect Meal as a Source of Protein in Animal Diet
...Show More Authors

View Publication
Scopus (26)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Wed Sep 16 2020
Journal Name
Journal Of Chemistry
Synthesis of Phthalimide Imine Derivatives as a Potential Anticancer Agent
...Show More Authors

The outstanding evidence of phthalimide pharmacophore in securing enhanced biological activities had encouraged further research and development into phthalimide-based derivatives as potential new drugs. In this study, phthalimide core was hybridized with aldehydes giving integrated imines displaying different types of functionalities and at alternating positions. The resulting compounds, therefore, provide an innovative window to explore possible differential biological effects as antioxidants and anticancer agents. A total of sixteen compounds were synthesized, and each was verified by FT-IR, H NMR, C NMR, and MS characterization. Herein, a facile single-step synthesis method was employed substituting the conventional two-step che

... Show More
View Publication
Scopus (23)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Al–bahith Al–a'alami
The Communicative Integration in New Media: Building a Communicative Model
...Show More Authors

The internet, unlike other traditional means of communication, has a flexibility to stimulate the user and allows him to develop it. Perhaps, the reason for the superiority of the internet over other traditional means of communication is the possibility of change and transmission from one stage to another in a short period. This means that the internet is able to move from the use to the development of the use and then the development of means and innovation as the innovation of the internet is a logical product of the interaction of the user with the network. The internet invests all the proposals and ideas and does not ignore any even if it is simple. This is represented in social networking sites which in fact reflects personal emotio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Nov 01 2014
Journal Name
American Journal Of Dermatology And Venereology
Direct Electrical Current is A New Therapeutic Option for Vitiligo
...Show More Authors

* Khalifa E. Sharquie1, Hayder Al-Hamamy2, Adil A. Noaimi1, Mohammed A. Al-Marsomy3, Husam Ali Salman4, American Journal of Dermatology and Venereology, 2014 - Cited by 2

View Publication