Preferred Language
Articles
/
abaa-460
PHARAOH'S CHARACTER BETWEEN THE QUR'ANIC TEXT AND THE ARABIC NOVEL: (Naguib Mahfouz's Pharaonic Novels as a Model)
...Show More Authors

The Character is one of the elements of Storytelling, as it is the center of the plot, making it the basis on which the talk is about. The talk is the portrayal of the character while they’re acting; the novelist presents the character by interacting with the events, and the extent of the negative and positive appearing impact on the character. It should be noted that everyone has two personalities or more, each one appearing in a different position or situation. For instance, a man can be a father, a lover, an employee, a son or anyone else .. in another position, he might be a master, and in another a looser begging for the mercy of his humiliator, and sometimes he can show weakness to the one he loves, or show strength to his enemies, therefore the novelists' interest was to show the special side of the characters after focusing on them and highlighting some of their hidden traits. And in order to understand the characters, they must convince us with their presence and their impact on the events of the novel. After this, we should refer to Pharaoh’s character; a real character, not a fictional one, especially that he had greatly influenced the evolvement of events into sometimes predictable outcomes, because the reader has already a historical reference about him, and the novelist was able to have the reader’s attention after realizing he’s understanding the personality, and conducting his ideas relative to the time he’s living rather than the era where Pharaoh lived, thus, these ideas and issues may seem separate from the society in which Pharaoh lived.

The Theoretical research included two main axes to construct the character: first, the physical aspect. Second: its behaviour.

We conclude that Najeeb Mahfuz had widened his field of vision from all that is individual and subjective, to a social and a lifelike view that is based on the artist’s deep contemplation of life, and his eagerness to reach the essence of things, using to get there, a human model of a character that is an example of arrogance and might as mentioned in the Holy Quran.

And why the character of Pharaoh ? Because it is common between readers that Pharaoh is a mighty arrogant, so the novelist wanted this to be his starting point from Pharaoh’s individuality until he speaks with his voice through this character, saying that the great state is based on Pharaoh the great, and that the greatness of Pharaoh cannot exist without dedicating his love to his people to the extent of sacrificing himself for the sake of them and his homeland. And if we look at the Pharaonic novels of Najeeb Mahfuz ( Khufu's Wisdom

 ) written in 1939, we’ll find that he defined the traits of the king who feels glorious when his people remind him that he is one of the greatest kings. Then he wrote ( Rhadopis of Nubia ) in 1943, where he described a vain king whose destiny was being killed by his people; all because he didn’t consider the destiny of his predecessors, and followed his pleasures, so Mahfuz used to say: “ This is the punishment of the person who is unjust with his people and cares only about his own interests and well being. Then we find that Mahfuz wrote ( Thebes at War ) in 1944, where he gives a different picture of Pharaoh than the two mentioned above; in the first one Pharaoh defends his throne along his life with all of his power and wealth, whereas surrenders to his destiny and accepts death in the second one. But in the third one, Pharaoh started to build himself physically and mentally since childhood in order to be eligible for this great task.

This is how Mahfuz fulfilled the condition of the mask technique in which the novelist is more contemplating than the original character from which the writer derived his idea, thus the creative expresses his experience in life and his creative view of things bringing all of that to the reality in which the recipient lives.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of The College Of Languages (jcl)
استنطاق النص الصوفي الأندلســــي
...Show More Authors

Heading of this research, to interrogate the text Sufi Andalusia, one of the displayed cognitive embodied the spirit of the experiment with Walsh nudity Sufi, who ascended to the world of spirituality within their experience of poetry, taking pictures of the perceived symbol cognitively carry through to the worlds transparent based Almwaged related Bashan soul and heart, has tried to invest communicative potential offered by .      

View Publication Preview PDF
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Forecasting the financial failure of Islamic banks using the Altman model, ---- springate model and ---- Sherrod model / an analytical study in Islamic banks listed on the Iraq Stock Exchange
...Show More Authors

Profit is a goal sought by all banks because it brings them income and guarantees them survival and continuity, and on the other hand, facing commitments without financial crisis. Hence the idea of research in his quest to build scientific tools and means that can help bank management in particular, investors, lenders and others to predict financial failure and to detect early financial failures. The research has produced a number of conclusions, the most important of which is that all Islamic banks sample a safe case of financial failure under the Altman model, while according to the Springate model all Islamic banks sample a search for a financial failure except the Islamic Bank of Noor Iraq for Investment and Finance )BINI(. A

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 28 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique
...Show More Authors

Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty

... Show More
View Publication
Crossref
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Comparison between some of linear classification models with practical application
...Show More Authors

Linear discriminant analysis and logistic regression are the most widely used in multivariate statistical methods for analysis of data with categorical outcome variables .Both of them are appropriate for the development of linear  classification models .linear discriminant analysis has been that the data of explanatory variables must be distributed multivariate normal distribution. While logistic regression no assumptions on the distribution of the explanatory data. Hence ,It is assumed that logistic regression is the more flexible and more robust method in case of violations of these assumptions.

In this paper we have been focus for the comparison between three forms for classification data belongs

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Aggregation of Accounting information between differentiated accounting systems ( Case Study )
...Show More Authors

The purpose of the research is to present a proposed accounting system model for converting and aggregating accounting information within the framework of the differentiated accounting systems, and the research methodology consists of: The research problem is the existence of differentiated and dispersed accounting systems that operate within governmental economic units and at the same time seek to achieve a unified vision and goals for the organization, and the central research hypothesis is the possibility of conducting the process of conversion accounting information from the government accounting system to the unified accounting system, and then aggregate those systems. The research was conducted at the College of Administrat

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jul 01 2025
Journal Name
Larc
Analysis of the character of women in the narrative works of Benito Pérez Galdós تحليل شخصية المرأة في الاعمال السردية لبينيتو بيريث غالدوس
...Show More Authors

Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Study and Analysis of the Factors that Affect the Efficiency of Small and Medium Enterprises in the Kingdom of Saudi Arabia
...Show More Authors

Encouraging micro-enterprises for comprehensive economic development are crucial to achieve the ambitious vision 2030 of the Kingdom of Saudi Arabia.

 Small and Medium enterprises are inputting around 15.5 per cent to GDP while 33 per cent contribution as a private sector to Saudi Arabia's gross domestic product (GDP). This study aims to identify the most important factors that affect the efficiency of small enterprises in Saudi Arabia. To accomplish this objective, the study was conducted for small projects via the comprehensive inventory method under the supervision of the Institute of Entrepreneurship. A total of 282 questionnaires were collected from entrepreneurs and the differentiation analysis

... Show More
View Publication Preview PDF
Crossref