Personification in Arab poetry is not confined to the abstract items in nature: it trespasses them to include more than that. We found after reviewing the anthologies of the poets tens of the personified items are full of human attributes - via personification- such as speaking, moving, feeling human feelings.. Personification formed a remarkable feature in the relationship between poets and war, which was clear in the Pre-Islamic poetry, because it occupied the minds of the ancient Arab mindset. The poets have envisioned war as ugly as a force that brings destruction and devastation. The paper aims at stating the position in which poets personified war with female tributes. Thus, it is impregnated, conceived, and produced birth like a woman. War is personified into the level of women. The importance of the research is to clarify the ability of poets to employ humanities in the humanization of war, as the poets were able to get war away from its real sense (as an abstract meaning) by personifying it. It possessed many human traits; especially the traits of the female, such as tenderness and betrayal in their view the image of war and woman are identical taking the war into the level of human feelings, and endowing it with semantic dimension by personifying it. Personification was manifested in the best of its forms in the selected poems. The poets viewed war to the level of the female human nature in form and content.
The National trend and employment of Islamic heritage.
This stydy is an attempt to concept The employment of national Trend of Islamic heritage to serve ideological goals .
The research indicates to Arabic sights of heritage and the heritage through the curriculum of the first hational association , especially the first national trend , Arab mobile associate and also Almuthana , Al_Haritha Al_sho clubs .
The research depends on more origin documents and more Iraqi journals.
ٕ ضٞظ٤ق جالْطٌٞز ك٢ جالوخ هى ظٍٜ ً٘ٓ ظٌٜٞ جالوخ جٗٞ٤ُح٢ٗ جُوىْ٣ ، جي ضؼى ٌجكىج ٜٔٓح ُالوخ ذحؾحٚٓٗ جُٔهطِلس ؛ قط٠ أٚركص جُ٘ٞٛ٘ جٍُٓو٣س جُكى٣ػس ٝ جُٔؼحٍٚز ، ال ٌٜ٘ٔ٣ح ضكو٤ن ٖؼ٣ٍطٜح ٝ ٓطؼطٜح وٕٝ جالْطِٜحّ ٖٓ جألْطٌٞز ذ٘حت٤ح أٝ ك٣ٌٍح ، ًُج كوى ض٘حٍٝ جُركع ذىٌٙٝ ضٞظ٤ق جْطٌٞز ٕٖٞٗٔ جُطٌٞجض٤س ، ٢ٛٝ ٖٓ جالْحٍ٤٠ جُط٢ ٝؾىش قٌٟٞج ك٢ جالوخ جُؼح٢ُٔ ٝجُؼر١ٍ .جي ئٕ ضٞظ٤لٜح ك٢ جالوخ ٣ؼطٜ٤ح ذؼىج ٤ٓطحك٣ُ٤وح ٝجنٍ جٓٗح٢ٗ ٣ؿٔغ ك٢
... Show MoreThe ammeter is art form from folklore of the Arab perform many character so he is actor several from place to another, you able to use your tools (body) and (voice), he is genus ammeter that the character
Gum Arabic is a natural gummy exudate gained from the trees of Acacia species (Acacia senegal and Acacia seyal), Family: Fabaceae. Gum Arabic considers as a dietary fiber with a high percentage of carbohydrates and low protein content. Sugars arabinose and ribose were originally discovered and isolated from gum Arabic and it is representing the original source of these sugars. A gum emanation from trees occurs under stress conditions such as heat, poor soil fertility, drought, and injury. Mainly gum is produced in belt region of Africa, mainly Sudan, Chad, and Nigeria. In the food industry, it is used in confectionery; in the pharmaceutical industry, it is used as emulsifier, film coating and others. Traditionally the g
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreAbstract The study aimed at reviewing translation theories proposed to address problems in translation studies. To the end, translation theories and their applications were reviewed in different studies with a focus on issues such as critical discourse analysis, cultural specific items and collocation translation.
To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of
... Show MoreThe speech recognition system has been widely used by many researchers using different
methods to fulfill a fast and accurate system. Speech signal recognition is a typical
classification problem, which generally includes two main parts: feature extraction and
classification. In this paper, a new approach to achieve speech recognition task is proposed by
using transformation techniques for feature extraction methods; namely, slantlet transform
(SLT), discrete wavelet transforms (DWT) type Daubechies Db1 and Db4. Furthermore, a
modified artificial neural network (ANN) with dynamic time warping (DTW) algorithm is
developed to train a speech recognition system to be used for classification and recognition
purposes. T