Preferred Language
Articles
/
IBdEoI4BVTCNdQwCKFbz
The translated text is a second launch of the text (Al-Kharja Al-Muwashah Al- Andalusian as an example
...Show More Authors

Literary translation is one of the most difficult types of translation ,because it conveys feelings that differ from one person to another, and since the language constitutes an obstacle to understanding the Andalusian excerpts, the translators resorted to translating it, and this was a second start to the text, different from its first start, is said from the tongue of the Al-washah , The muwashshah is a poetic art that appeared in Andalusia after the Arabs entered it ,characterized by special system It differs from the traditional Arabic poem, as it has a beginning represented in the beginning of the muwashshah and several equal parts ending with differentrhymes. The Al-washah ends his speech with fragments called al-Kharja, which have special rhymes and are written in the classical Arabic, colloquial or Spanish. The topic of my research focuses on the publications written in Spanish, which were the focus of the attention of orientalists and Arab researchers.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Engineering
Hydraulic Analysis of the Samarra-Al Tharthar System
...Show More Authors

Low incoming discharge upstream of Samarra-Al Tharthar System leads to sediment accumulation and forming islands, especially an island upstream of Al Tharthar Regulator. This island and the sedimentation threaten the stability of the structure and reduce the efficiency of the system. This study aims to hydraulically identify the sedimentation problem mentioned above, to find solutions of how to control the sediment problems, and to develop the capacity of
the system for 500 years return period flood of 15060 m3/s. Surface Water Modeling System (SMS10.1) with two dimensional depth average models (RMA-2) software were used to simulate and analyze the system. The results of analysis showed that the maximum permissible discharge through t

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Civil Administration on the Suburbs of Al–Kufa
...Show More Authors

We have found through research , that administrative institutions on the outskirts of Kufa and their management is not as important as administrative institution in place that were associated with it and subject to its control ,as it often was express power , or poor ( if true ) expression , directors of the center for the suburbs , as it became clear to our diversity of those administrative institutions and prominent role in the interest of the affairs of the people and society in all aspects of life , and are the functions and different staff from the highest authority the suburbs represented by house of representatives ( the workers ) ,then workers abscess and Al-dhaqan and not to mention for other jobs came the actions of Bhaltsier a

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 29 2022
Journal Name
College Of Islamic Sciences
The Scientific Efforts of Ahmed Mustafa Al-Maraghi
...Show More Authors

This conducted research,  (The Scientific Efforts of Ahmed Mustafa Al-Maraghi) deals with Al-Maraghi's life, birth, upbringing, characteristics, title, family and religion secter, as well as his general biography. And his relationship with scholars, his learning and teaching, and the introduction of the Muhammed Abdo School and the College of Dar Al Uloom, and finally the discussion  of his scientific, social and political poin of view, as an interpreter of twentieths century, was  appointed as the president of Al-Azhar and Ifta during the days of the royal era, and he studied at the College of Dar Al-Uloom

 

View Publication Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Al-Hafizh Abdan al-Ahwazi, 306 And his modern efforts
...Show More Authors

Abadan, one of the modernists, is the critics, whose words depend on the wound, the modification and the ills of the hadeeth.
He lived Abadan, age in the request to talk and take the elders, and Awali, and attribution, which affected him by taking, and update about (300) Sheikh or more.
Abadan also excelled in the novel and its origins, which made students talk to him, and ask for the novel, with his hardness and hardship. As we will see in the folds of the search

View Publication Preview PDF
Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
Fast Text Analysis Using Symbol Enumeration and Hashing Methodology
...Show More Authors

This paper is focusing on reducing the time for text processing operations by taking the advantage of enumerating each string using the multi hashing methodology. Text analysis is an important subject for any system that deals with strings (sequences of characters from an alphabet) and text processing (e.g., word-processor, text editor and other text manipulation systems). Many problems have been arisen when dealing with string operations which consist of an unfixed number of characters (e.g., the execution time); this due to the overhead embedded-operations (like, symbols matching and conversion operations). The execution time largely depends on the string characteristics; especially its length (i.e., the number of characters consisting

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding text in gray image using mapping technique
...Show More Authors

Publication Date
Sat Nov 02 2019
Journal Name
Advances In Intelligent Systems And Computing
Spin-Image Descriptors for Text-Independent Speaker Recognition
...Show More Authors

Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Engineering
Comparison the Physical and Mechanical Properties of Composite Materials (Al /SiC and Al/ B4C) Produced by Powder Technology
...Show More Authors

In this investigation, metal matrix composites (MMCs) were manufactured by using powder technology. Aluminum 6061 is reinforced with two different ceramics particles (SiC and B4C) with different volume fractions as (3, 6, 9 and 12 wt. %). The most important applications of particulate reinforcement of aluminum matrix are: Pistons, Connecting rods etc. The specimens were prepared by using aluminum powder with 150 µm in particle size and SiC, B4C powder with 200 µm in particle size. The chosen powders were mixed by using planetary mixing setup at 250 rpm for 4hr.with zinc stearate as an activator material in steel ball milling. After mixing process the powders were compacted by hydraulic

... Show More
View Publication Preview PDF