This research discusses the verbal follow phenomenon in Al-Amali Abi Al-Qali’s book (seq.356 Hijri). It aims to limit the examples of this phenomenon in the book, and examine it phonologically. Accordingly, the researcher adopted the analaytical descriptive approach, taking into account Al-Rawi’s letter when ordering the verbal follow-based examples, and the order they took in the book in question. The purposes behind this phonological study of verbal follow in Al-Amali’s book are to: reach the sounds which Arabs prefer in the process of following, confirm different beautiful and desirable senses, have easy and speedy pronunciation, maintain harmony between adjacent sounds, count the sounds that occur at the beginning of the follower- a disputable phonological issue between the follower and following- and spot the phonological change that occurs to the follower. Accordingly, a caution is needed to maintain harmony and homogeneity between two pronunciations to achieve the process of following. Or, the structure of the word follower is changed to match its peer followed word.The study has shown that Al-Qali was the eldest in dealing with the formal aspect of the phenomenon. He pointed to the idea of merging the last letter in the subordinate and the follower, and compared it with a stylistic, artistic, and acoustic characteristic, which is included in the innate rhetoric, i.e., assonance. By that, he has determined the most important formal acoustic features of the rhythmic complex as represented by the endings of the sequences, which have a musical rhythm.
This research deals with the qualitative and quantitative interpretation of Bouguer gravity anomaly data for a region located to the SW of Qa’im City within Anbar province by using 2D- mapping methods. The gravity residual field obtained graphically by subtracting the Regional Gravity values from the values of the total Bouguer anomaly. The residual gravity field processed in order to reduce noise by applying the gradient operator and 1st directional derivatives filtering. This was helpful in assigning the locations of sudden variation in Gravity values. Such variations may be produced by subsurface faults, fractures, cavities or subsurface facies lateral variations limits. A major fault was predicted to extend with the direction NE-
... Show MoreIn order to reduce the environmental pollution associated with the conventional energy sources and to achieve the increased global energy demand, alterative and renewable sustainable energy sources need to be developed. Microbial fuel cells (MFCs) represent a bio-electrochemical innovative technology for pollution control and a simultaneous sustainable energy production from biodegradable, reduced compounds. This study mainly considers the performance of continuous up flow dual-chambers MFC
fueled with actual domestic wastewater and bio-catalyzed with anaerobic aged sludge obtained from an aged septic tank. The performance of MFCs was mainly evaluated in terms of COD reductions and electrical power output. Results revealed that the C
The aim of this study is for testing the applicability of Ramamoorthy and Murphy method for identification of predominant pore fluid type, in Middle Eastern carbonate reservoir, by analyzing the dynamic elastic properties derived from the sonic log. and involving the results of Souder, for testing the same method in chalk reservoir in the North Sea region. Mishrif formation in Garraf oilfield in southern Iraq was handled in this study, utilizing a slightly-deviated well data, these data include open-hole full-set logs, where, the sonic log composed of shear and compression modes, and geologic description to check the results. The Geolog software is used to make the conventional interpretation of porosity, lithology, and saturation. Also,
... Show MoreThe densities and visconsities of solutions of poly(vinyl alcohol)(PVA) molccuar weight (14)kg.mol-1in water up to 0.035%mol.kg-1
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More