This research discusses the verbal follow phenomenon in Al-Amali Abi Al-Qali’s book (seq.356 Hijri). It aims to limit the examples of this phenomenon in the book, and examine it phonologically. Accordingly, the researcher adopted the analaytical descriptive approach, taking into account Al-Rawi’s letter when ordering the verbal follow-based examples, and the order they took in the book in question. The purposes behind this phonological study of verbal follow in Al-Amali’s book are to: reach the sounds which Arabs prefer in the process of following, confirm different beautiful and desirable senses, have easy and speedy pronunciation, maintain harmony between adjacent sounds, count the sounds that occur at the beginning of the follower- a disputable phonological issue between the follower and following- and spot the phonological change that occurs to the follower. Accordingly, a caution is needed to maintain harmony and homogeneity between two pronunciations to achieve the process of following. Or, the structure of the word follower is changed to match its peer followed word.The study has shown that Al-Qali was the eldest in dealing with the formal aspect of the phenomenon. He pointed to the idea of merging the last letter in the subordinate and the follower, and compared it with a stylistic, artistic, and acoustic characteristic, which is included in the innate rhetoric, i.e., assonance. By that, he has determined the most important formal acoustic features of the rhythmic complex as represented by the endings of the sequences, which have a musical rhythm.
The current research aims to validate the Effect of technical innovation on human resources management ambidexterity through job embeddedness. The current research was done in Al-Etihad Food Industries Co. Ltd. And within the industrial environment, the research was designed according to the descriptive research. And to achieve the main goal of the research above, the researcher used the questionnaire as a key instrument to collect data through the views of a sample of managers, and employees at the senior, middle and executive management level. The research sample reached (107) individuals, the data were analysed using the statistical packages (SPSS v. 26) and ( SMART PLS v 3. 3. 8) the group of statistical
... Show MorePraise be to God, Lord of the worlds, and the best of prayers. He has completed the delivery of our master Muhammad, his family, and all his companions. O God, bring us out from the darkness of illusion, honor us with the light of understanding, open us with knowledge of knowledge, facilitate our morals with dreams, and make us who listen to the saying and follow their best.
And after ..
Since ancient times, magic was mentioned in many books in the history of the civilizations of ancient peoples, where the first emergence of human civilizations, the oldest of which is the Mesopotamian civilization, the Chinese civilization, and the Pharaonic civilization in Egypt, where concepts prevailed based on the charlatans and sorcery an
... Show MoreThe research tackles the nature of relationship between the Orthodox Church and the state in the Russian Federation. At the beginning of the nineties of the last century, the church had been performed a different role in its relationship with the state, and it had an effect over the internal and foreign policies for the Russian Federation. In political history of Russia, the church’s existence became an evident too much in comparing with the previous historical period, starting with the educational and political system, whether through a symbolic participating roles as what happened in the inauguration ceremony to take over responsibility of the head of state or taking actual roles such as influencing on the process of holding elections d
... Show MoreAbstract The means of self-determination have their peaceful and non-peaceful dimensions and are united(peaceful and non-peaceful) by international consensus adopted by international conventions and instruments. This has given it various dimensions at the applied level, especially in the light of the contemporary international developments witnessed by the world represented by a number of complete and incomplete implementation models that have nothing to do with the theory of truth Self-determination associated with the liberation of peoples from colonial domination or the liberation of oppressed nationalities
The central nervous system is the most important system and is very sensitive to any accidental infection during ontogenesis; it includes brain and spinal cord. The cerebellum is the second largest part of the brain after cerebrum and it’s very sensitive to the abnormal changes during the embryological development. This study was designed to investigate the effect of the maternal exposure of selected concentrations of suspension of nanoparticles on the ontogenesis of the rat cerebellum after embryos implanted in uterus. A total of 60 female pregnant rats were divided in to three groups, each contains 20 females. Group1 (G1) was treated orally with 2mg/kg /body weight (b. wt) of suspension of silver nanoparticles (Ag NPs). While group 2 (G
... Show MoreWith the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreThe major objective of this study is to establish a network of Ground Control Points-GCPs which can use it as a reference for any engineering project. Total Station (type: Nikon Nivo 5.C), Optical Level and Garmin Navigator GPS were used to perform traversing. Traversing measurement was achieved by using nine points covered the selected area irregularly. Near Civil Engineering Department at Baghdad University Al-jadiriya, an attempt has been made to assess the accuracy of GPS by comparing the data obtained from the Total Station. The average error of this method is 3.326 m with the highest coefficient of determination (R2) is 0.077 m observed in Northing. While in