In this paper, we consider new subclasses of meromorphic uniformly of multivalent functions in with fixed second coefficient, we obtain the estimation of coefficients, distortion theorems, closure theorems and some other results.
Metaphor is a linguistic phenomenon related to people's cultures. It is an integral part of cultural heritage. This paper tackles the use of animal-based metaphors in the field of football club titles so as to draw comparisons between those in Russian with their counterparts in Arabic. Names of animals are used to refer to some clubs and teams, where these names or titles reflect animal features such as strength, preying on victims; or animal figures are employed in the club symbols, or due to the similarity of the club shirt to the animal outer shapes in colours. For instance, "an-Nawaris", which means gulls in English, is used to refer to az-Zawraa club du
... Show MoreIn this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise closure topological spaces, fibrewise wake topological spaces, fibrewise strong topological spaces over B. Also, we introduce the concepts of fibrewise w-closed (resp., w-coclosed, w-biclosed) and w-open (resp., w-coopen, w-biopen) topological spaces over B; Furthermore we state and prove several Propositions concerning with these concepts.
Fuzzy orbit topological space is a new structure very recently given by [1]. This new space is based on the notion of open fuzzy orbit sets. The aim of this paper is to provide applications of open fuzzy orbit sets. We introduce the notions of fuzzy orbit irresolute mappings and fuzzy orbit open (resp. irresolute open) mappings and studied some of their properties. .
Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
چکیدهی بحث
به نظر میآید که عالم هستی ، بر مسألهی « حرکت» استوار دارد ، و روح ، همیشه دنبال دگرگونی و تکامل و برتری میگردد. حرکت ، همهی چیزها در عالم إمکان را در بر میگیرد. حرکت در بنیادهای فکر مولانا جای مهمی دارد .اشعار مولانا مقدار زیادی از پویایی و حرکت برخوردارست، و از آنجایی که فعل ، عنصر تکانبخش جمله ، و کانون دلالت است ، ترجیح دادیم - علاوه بر دیگر عنا
... Show MoreThe Islamic architectural heritage constitutes a civilized fortune that has to be preserved and protected and work should be done to maintain its development to be more convenient for the circumstances of the age and the civilization transformations. Due to the fact that architecture represents the civilization pot and cultural identity, its originality has to be preserved and work has to be done to prevent the strange architectural invasion that changes its character and make it lose the identity and the character and detached from its roots and environment.
Decoration, in the interior design, as a concept is connected to ornamentation process of interior spaces, which is a process of adding certain items
... Show MoreOne of the Kurdish scholars who have research on the doctrinal issues of the author of this brief message that we are about to achieve; to bring it out better and in order to preserve the Islamic heritage, and revive what can be revived after being close to death by staying in libraries here and there, out of reach of hands, carrying dust Years of forgetting and marginalization, and this letter is the papers in the door of the divorce entitled his author "Iqdar al-dream for those who did not sign divorce commoner," and the name is evident the name, and the intention of the author through writing, where he wrote it to answer some of the knowledgeable among the public at the time So they decreed that there was no divorce from commoners D w
... Show MoreThe implicit is the narrative technique used to give indirect hidden messages. To read between the lines means to understand the implicit meaning that is not directly indicated. This technique is expressed in two forms: the hypothesis and the implications of linguistic and non-linguistic rules. Nathalie Sarraute’s "Pour un oui ou pour un non" states this narrative method through her character’s verbal and non-verbal dialogue. The present paper discusses the implicit method and shows the reason behind which the author uses it in her play "Pour un oui ou pour un non".
Résumé
... Show MoreThe present work focuses on examining the strategy of cognitive trips and the Arabic language teachers’ training needs of such a strategy when teaching Arabic language courses in the Saudi Arabia Kingdom. To achieve the objective of the study, and check whether this strategy is used in lesson planning, lesson teaching, or lesson assessment, a descriptive approach and a questionnaire have been adopted. The researchers used a number of statistical tools, and chose a purposive sample, which consists of (58) Arabic language teachers from Saudi Arabia Kingdom. Results have shown that the training needs of Arabic language teachers for implemining the strategy of cognitive journeys while teaching Arabic language courses came in the following
... Show MoreIn this work, polynomials and the finite q-exponential operator are constructed. The operator is used to combine an operator proof of the generating function with its extension, Mehler's formula with its extension and Roger's formula for the polynomials . The generating function with its extension, Mehler's formula with its extension and Rogers formula for Al-Salam-Carlitz polynomials are deduced by giving special values to polynomials .