يعد هذا النص أحد النصوص المسمارية المصادرة التي بحوزة المتحف العراقي، ويحمل الرقم المتحفي (235869)، قياساته )12،7x 6x 2،5سم). يتضمن مدخولات كميات من الشعير،أرخ النص الى عصر أور الثالثة (2012-2004 ق.م) و يعود الى السنة الثالثة من حكم الملك أبي-سين (2028-2004 ق.م)،أن الشخصية الرئيسة في هذا النص هو)با-اَ-كا مسمن الماشية( من مدينة أري-ساكرك، ومقارنته مع النصوص المسمارية المنشورة التي تعود الى أرشيفه يبلغ عددها (196) نصاً تضمنت نشاطاته من السنة السابعة من حكم الملك أمار-سين والى السنة الثالثة من حكم الملك أبي-سين.
This paper is mainly concerned with the study of the moral aspects that prompts William Shakespeare to attempt a romance in which he has embedded the epitome of his thought, experience, and philosophy concerning certain significant aspects of human life whose absence or negligence may threaten human existence, peace, and stability. From the beginning of history man realizes the importance of prosperity on the many and various levels that touch and address his needs and desires—natural, material, and spiritual. The Tempest, due to the dramatist's awareness of the aforementioned values, reflects the dramatist's duty as to projecting and unfolding these important aspects, rec
... Show MoreThis paper is mainly concerned with the study of the moral aspects that prompts William Shakespeare to attempt a romance in which he has embedded the epitome of his thought, experience, and philosophy concerning certain significant aspects of human life whose absence or negligence may threaten human existence, peace, and stability. From the beginning of history man realizes the importance of prosperity on the many and various levels that touch and address his needs and desires—natural, material, and spiritual. The Tempest, due to the dramatist's awareness of the aforementioned values, reflects the dramatist's duty as to projecting and unfolding these important aspects, reconciliation and forgiveness, that promote prosperity which is th
... Show MoreA novel metal complexes Cu (II), Co (II), Cd (II), Ru (III) from azo ligand 5-((2-(1H-indol-2-yl)
ethyl) diazinyl)-2-aminophenol were synthesized by simple substitution of tryptamine with 2-aminophenol.
Structures of all the newly synthesized compounds were characterized by FT IR, UV-Vis, Mass spectroscopy
and elemental analysis. In addition measurements of magnetic moments, molar conductance and atomic
absorption. Then study their thermal stability by using TGA and DSC curves. The DCS curve was used to
calculate the thermodynamic parameters ΔH, ΔS and Δ G. Analytical information showed that all complexes
achieve a metal:ligand ratio of [1:1]. In all complex examinations, the Ligand performs as a tri
A novel metal complexes Cu (II), Co (II), Cd (II), Ru (III) from azo ligand 5-((2-(1H-indol-2-yl) ethyl) diazinyl)-2-aminophenol were synthesized by simple substitution of tryptamine with 2-aminophenol. Structures of all the newly synthesized compounds were characterized by FT IR, UV-Vis, Mass spectroscopyand elemental analysis. In addition measurements of magnetic moments, molar conductance and atomic absorption. Then study their thermal stability by using TGA and DSC curves. The DCS curve was used to calculate the thermodynamic parameters ΔH, ΔS and Δ G. Analytical information showed that all complexes achieve a metal:ligand ratio of [1:1]. In all complex examinations, the Ligand performs as a tridentate ligand, connecting Cu (
... Show MoreAnomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreCognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections. Schema and text world theories are useful tools in cognitive stylistic studies. The reader's perception o
... Show MoreCognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections.
Schema and text world theories are useful tools in cognitive stylistic stud
... Show MoreThis work is the first study of the Curculionoidea fauna from Kurdistan region of Iraq, based on the intensive survey in different localities of Kurdistan from March 2016 to November 2017. In total, 41 species belonging to 28 genera, 21 tribes and 3 families were collected and identified, including 25 species newly recorded for the Iraqi fauna.
General distribution, collecting localities and methods, with plant association data for each species are given.
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called