Preferred Language
Articles
/
abaa-460
PHARAOH'S CHARACTER BETWEEN THE QUR'ANIC TEXT AND THE ARABIC NOVEL: (Naguib Mahfouz's Pharaonic Novels as a Model)
...Show More Authors

The Character is one of the elements of Storytelling, as it is the center of the plot, making it the basis on which the talk is about. The talk is the portrayal of the character while they’re acting; the novelist presents the character by interacting with the events, and the extent of the negative and positive appearing impact on the character. It should be noted that everyone has two personalities or more, each one appearing in a different position or situation. For instance, a man can be a father, a lover, an employee, a son or anyone else .. in another position, he might be a master, and in another a looser begging for the mercy of his humiliator, and sometimes he can show weakness to the one he loves, or show strength to his enemies, therefore the novelists' interest was to show the special side of the characters after focusing on them and highlighting some of their hidden traits. And in order to understand the characters, they must convince us with their presence and their impact on the events of the novel. After this, we should refer to Pharaoh’s character; a real character, not a fictional one, especially that he had greatly influenced the evolvement of events into sometimes predictable outcomes, because the reader has already a historical reference about him, and the novelist was able to have the reader’s attention after realizing he’s understanding the personality, and conducting his ideas relative to the time he’s living rather than the era where Pharaoh lived, thus, these ideas and issues may seem separate from the society in which Pharaoh lived.

The Theoretical research included two main axes to construct the character: first, the physical aspect. Second: its behaviour.

We conclude that Najeeb Mahfuz had widened his field of vision from all that is individual and subjective, to a social and a lifelike view that is based on the artist’s deep contemplation of life, and his eagerness to reach the essence of things, using to get there, a human model of a character that is an example of arrogance and might as mentioned in the Holy Quran.

And why the character of Pharaoh ? Because it is common between readers that Pharaoh is a mighty arrogant, so the novelist wanted this to be his starting point from Pharaoh’s individuality until he speaks with his voice through this character, saying that the great state is based on Pharaoh the great, and that the greatness of Pharaoh cannot exist without dedicating his love to his people to the extent of sacrificing himself for the sake of them and his homeland. And if we look at the Pharaonic novels of Najeeb Mahfuz ( Khufu's Wisdom

 ) written in 1939, we’ll find that he defined the traits of the king who feels glorious when his people remind him that he is one of the greatest kings. Then he wrote ( Rhadopis of Nubia ) in 1943, where he described a vain king whose destiny was being killed by his people; all because he didn’t consider the destiny of his predecessors, and followed his pleasures, so Mahfuz used to say: “ This is the punishment of the person who is unjust with his people and cares only about his own interests and well being. Then we find that Mahfuz wrote ( Thebes at War ) in 1944, where he gives a different picture of Pharaoh than the two mentioned above; in the first one Pharaoh defends his throne along his life with all of his power and wealth, whereas surrenders to his destiny and accepts death in the second one. But in the third one, Pharaoh started to build himself physically and mentally since childhood in order to be eligible for this great task.

This is how Mahfuz fulfilled the condition of the mask technique in which the novelist is more contemplating than the original character from which the writer derived his idea, thus the creative expresses his experience in life and his creative view of things bringing all of that to the reality in which the recipient lives.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison Between Some Estimator Methods of Linear Regression Model With Auto-Correlated Errors With Application Data for the Wheat in Iraq
...Show More Authors

This research a study model of linear regression problem of autocorrelation of random error is spread when a normal distribution as used in linear regression analysis for relationship between variables and through this relationship can predict the value of a variable with the values of other variables, and was comparing methods (method of least squares, method of the average un-weighted, Thiel method and Laplace method) using the mean square error (MSE) boxes and simulation and the study included fore sizes of samples (15, 30, 60, 100). The results showed that the least-squares method is best, applying the fore methods of buckwheat production data and the cultivated area of the provinces of Iraq for years (2010), (2011), (2012),

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Mar 30 2022
Journal Name
College Of Islamic Sciences
The grammatical approach to explain Bant Souad's poem (Explanation of Ibn Hisham as a model) a . M . Dr. Abdul Hamid Hamad shehatha Mustansiriya University Faculty of Basic Education the department of Arabic language
...Show More Authors

 

This study is concerned with shedding light on the grammatical method of Ibn Hisham Al-Ansari (761 AH), in his explanation of Bant Souad’s poem by the poet Kaab bin Zuhair, and I included a brief description of Ibn Hisham’s life with a number of explanations of this poem, then clarified the most important features of this method The grammar represented by his reliance on hearing and presenting it to analogy with mention of types of analogy, as well as his attribution of opinions to their owners with weighting, selection and balancing, and his attention to reasoning and a number of grammatical ailments, and his approach is also distinguished by following the method of fractal.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Al-academy
The functional diversity of the directorial vision in the political theater cinema as a model
...Show More Authors

It is very necessary for the political theater to be within the space of every theatrical performance, so that the theater carries the diverse and enlightened values and cultures of this world. political theatre. In the first chapter, the researcher dealt with (the methodological framework), which includes the research problem identified by the researcher with the following question (the functional diversity of the directorial vision in the political theater)
Importance, purpose, limits and seal by defining terminology.
In the second chapter, the researcher dealt with the theoretical framework on two topics, the first (transformations of directorial vision in theatrical performance) and the second topic (aesthetic experiences i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 25 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Combining a Hill Encryption Algorithm and LSB Technique With Dispersed Way for Securing Arabic and English Text Messages Hidden in Cover Image
...Show More Authors

         In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate      ( 75-86) that differentiates according to  length of message and image resolution

View Publication Preview PDF
Publication Date
Sun Sep 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Combining a Hill Encryption Algorithm and LSB Technique With Dispersed Way for Securing Arabic and English Text Messages Hidden in Cover Image
...Show More Authors

         In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate      ( 75-86) that differentiates according to  length of message and image resolution.

View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measuring the relationship between the skills required for the labor market and the employment of graduates of community colleges in KSA: An applied study on a sample of faculty members at KKU
...Show More Authors

This study has aimed to measure the relationship between the skills required for the labor market and the employment of graduates of community colleges at King Khalid University. For gathering the required data, a questionnaire has been designed and distributed to the faculty members of community colleges at King Khalid University in a random sample method. The chosen sample size has covered (123) individuals. Questionnaire forms have been distributed and retrieved from (117) participants. Therefore, the estimated response has reached 95 % of the total sample size. The results of the study have shown that there is not any significant relationship between the skills which the graduates   acquire and the requirements of employmen

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2013
Journal Name
College Of Islamic Sciences
 Attribution to the verb between the grammatical rule and the linguistic reality
...Show More Authors

The research discusses the issue of attribution to the verb, because the Arab scholars are unanimous in preventing attribution of the verb, because it is always informed of it, and does not inform about it, but this consensus violates the linguistic use. The research discusses this matter.

View Publication Preview PDF
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Analytical Study Compared Between Poisson and Poisson Hierarchical Model and Applied in Healthy Field
...Show More Authors

Through this research, We have tried to evaluate the health programs and their effectiveness in improving the health situation through a study of the health institutions reality in Baghdad to identify the main reasons that affect the increase in maternal mortality by using two regression models, "Poisson's Regression Model" and "Hierarchical Poisson's Regression Model". And the study of that indicator (deaths) was through a comparison between the estimation methods of the used models. The "Maximum Likelihood" method was used to estimate the "Poisson's Regression Model"; whereas the "Full Maximum Likelihood" method were used for the "Hierarchical Poisson's Regression Model

... Show More
View Publication Preview PDF
Crossref