This research is dedicated to study Al-Ra’ee Al-Numayri, a distinctive poetic character, to find out the most important (artistic) pre-Islamic features that contributed to its formation. It is further dedicated to know the influence of these features on his literature in the literary arena. After surveying his poetic texts and reading them according to the analytical and investigative methods, the art of the researcher was limited to the field of traditionalists. He was following the footsteps of the ancients by adhering to the traditional Arabic poetry style and the traditional poetic image. Despite that, he had his own imprints and unique style of interrogating times and places with its people, animals and plants. He drew creative, sensual, and artistic poetic images.He bestowed movement and life to his talismanic and flirtatious images by describing the journey and the camel that won the honor of the poet’s eternal participation in all his poetic texts. Consequently, his camel became his legendary animal that accompanies him in his solitude and travels. The participation of the camel in his poetry was an emotional participation of his hopes and pains as well as a test to his patience and dream as it is his partner in his endeavors to praise and obtain the giving and dew of what is desired by him. In the midst of all these events, the effectiveness of the poet's imagination ranked him among the pioneers of Islamic poets. The research falls into an introduction and four axes that clarify the most important of features of his poetry. The study proved his superior poetic ability despite his commitment to the traditionalists.
SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreLegislative language is characterized by its complexity, specifically in the process of translating statutory terms from two quite different languages, and from totally two different legal systems as from Spanish into Arabic. The present study stresses the process of translating legislative terms used in Spanish wills into Arabic through high lightening the polysemy of such mentioned terms and explaining their use in other legislative grounds. Additionally, the present study elucidates, analyzes, underlines the difficulty and looks for the most appropriate procedures and techniques of translating some of the prominent inheritance expressions taking in account the legislative dif
... Show MoreThe present analysis targets to recognize the influence of the separate teaching approach on the accomplishment of grammar for scholars of the College of Islamic Sciences. The target of attaining this target led the investigations developing the subsequent null theories: 1. No statistically substantial variance is happened at the consequence level of 0.05 between the mean scores of the scholars in the investigational category who learnt consistent with the separate learning approach and the mean scores of the scholars in the control category who learnt in the conventional method in the accomplishment test. 2. No statistically substantial variance has been observed at the consequence level of 0.05 in the mean differences between the
... Show MoreBackground: Depression is a common mental disorder that presents with depressed mood;it can become chronic or recurrent and affect dental health .Thus this research aimed to assess the prevalence and severity of dental caries among students with different grade of depression in relation to physicochemical characteristics of stimulated whole saliva. Materials and methods: The total sample involved for depression status assessment is composed of 800 students for both gender aged 15 years old that were selected randomly , This was performed using children depression inventory (CDI) index that divided the students into four groups of depression(low or average grade, high average grade, elevated grade and very elevated grade). The diagnosis and
... Show Moreالتعددية السياسية بين الرفلض والقبول دراسة نظرية لأبرز الاتجاهات الاسلامية المعاصرة
Aim: The study aimed to investigate the presence of the specific B1 gene T gondii in blood and milk samples from natural infected cattle and pregnant women (16-30 weeks) whose examination performed by the officers at the women's and children's Educational hospital in Al-Diwaniyah, Iraq. Materials and methods: A total of 150 serum samplings were collected analysed and scanned for Anti-T gondi antibodies (75 naturally-infected goats and 75 pregnant women with Toxoplasma). Polymerase chain reaction (PCR) was used to detect of B1(399pb) gene in 26 goat's blood samples and 7 samples from pregnant women. Results: A quick-test anti-cassette gondii results showed 26 positive samples of goats in a percentage of 34,666 percent, while a higher percent
... Show MoreIn Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More