This study aims to apply the theory of "Text from Text and the Plus Dimension" in the analysis of the Prophetic discourse found in the section on the virtues of knowledge and scholars from Imam Sahih al-Bukhari's book. This section covers several topics, including the virtue of gathering for the sake of learning, the superiority of a scholar over a worshipper, the excellence of jurisprudence in the religion of Allah, the acquisition of knowledge through the passing away of scholars, the merit of inviting people to Allah, the continuing benefit of beneficial knowledge after a scholar's demise, the warning against seeking knowledge for purposes other than Allah, and the Prophet seeking refuge from knowledge that brings no benefit. This is an applied analytical study that aims to elucidate the scientific miraculousness in the Prophetic hadiths and explain the meanings of the Prophetic sayings in harmony with scholars and the majority. It also seeks to derive moral lessons from the hadiths and reveal meanings that might be ambiguous or hidden using the "Text from Text and the Plus Dimension" theory in the analysis of the Prophetic discourse. The study arranges the sentences of the hadiths in the section on the virtues of knowledge and scholars from Sahih al-Bukhari's book and examines their meaning and rhetorical composition. It links them with mathematical geometric relationships such as rotation, expansion through magnification and contraction, withdrawal (beginning with the beginning), and reflection (beginning with the end). The study adopts an analytical and explanatory methodology to achieve its objectives, and the corpus of the study consists of Prophetic hadiths from the section on the virtues of knowledge and scholars from Sahih al-Bukhari's book, along with all its topics. This research builds upon two previous studies where the theory was applied to analyze the Prophetic discourse: "Inviting to Contemplate the Prophetic Discourse: Text from Text and the Extra Dimension in the Analysis of the Prophetic Discourse" (Al-Rawajfeh, 2020) and "The Theory of Text from Text and the Extra Dimension in the Analysis and Miraculousness of the Prophetic Discourse: An Application to the Book of Faith from Sahih al-Bukhari" (Al-Rawajfeh and Al-Jubbah, 2023)
Natural frequency under initial stresses for simply supported cross-ply composite laminated plates (E glass- fiber) are obtained using Refind theory (RPT). This theory accounts for parabolic distribution of the transverse shear strain through the plate thickness and satisfies the zero traction boundary conditions on the surfaces of the plate without using shear correction factors. The governing equations for Eigen value problem under initial stress are derived using Hamilton’s principle and solved using Navier solution for simply supported cross-ply symmetric and antisymmetric laminated plates. The effect of many design factors such as modulus ratio, thickness ratio and number of laminates on the Natural frequency and buckling stresses
... Show MoreThe messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show MoreThe article considers a creolized text as a means of modern communication, describing its key verbal and visual components; the relationship of concepts polycode and creolized text has been shown; the universal basic image features have been called; the following kinds of creolized texts have been distinguished; it has been proved that the effective means of attracting the attention of the addressee is the use of expressive font features, which are divided into two groups: topographics (mechanisms of varying of areal syntagmatic of a text) and supragraphcs (change of typeface of font).
This research deals with one scene from the movie Romeo and Juliet, which is the balcony scene, due to the importance of this scene in the formation of the construction of the subsequent events of the movie.
The first chapter contained the methodological framework of the research, where the research problem was identified in how Zeffirelli dealt with the balcony scene in the play Romeo and Juliet and enriched it in the cinematic language with a comparison with the original text of the scene. In the balcony scene with comparative parts between the film and the text and the limits of the research that was limited to the film Zeffirelli and the translated text by Munis Taha Hussein.
The second chapter contained the theoretic
... Show MoreIn this paper, we investigate the automatic recognition of emotion in text. We perform experiments with a new method of classification based on the PPM character-based text compression scheme. These experiments involve both coarse-grained classification (whether a text is emotional or not) and also fine-grained classification such as recognising Ekman’s six basic emotions (Anger, Disgust, Fear, Happiness, Sadness, Surprise). Experimental results with three datasets show that the new method significantly outperforms the traditional word-based text classification methods. The results show that the PPM compression based classification method is able to distinguish between emotional and nonemotional text with high accuracy, between texts invo
... Show MoreThis work presents a symmetric cryptography coupled with Chaotic NN , the encryption algorithm process the data as a blocks and it consists of multilevel( coding of character, generates array of keys (weights),coding of text and chaotic NN ) , also the decryption process consists of multilevel (generates array of keys (weights),chaotic NN, decoding of text and decoding of character).Chaotic neural network is used as a part of the proposed system with modifying on it ,the keys that are used in chaotic sequence are formed by proposed key generation algorithm .The proposed algorithm appears efficiency during the execution time where it can encryption and decryption long messages by short time and small memory (chaotic NN offer capacity of m
... Show MoreText categorization refers to the process of grouping text or documents into classes or categories according to their content. Text categorization process consists of three phases which are: preprocessing, feature extraction and classification. In comparison to the English language, just few studies have been done to categorize and classify the Arabic language. For a variety of applications, such as text classification and clustering, Arabic text representation is a difficult task because Arabic language is noted for its richness, diversity, and complicated morphology. This paper presents a comprehensive analysis and a comparison for researchers in the last five years based on the dataset, year, algorithms and the accuracy th
... Show MoreRÉSUMÉ
LeMauger Bleu est une méthode emblématique de l’enseignement traditionnel, qui présente une littérature française riche et patrimoniale, et dont l’objectif est de faciliter l’accès au texte par le vocabulaire et la grammaire et d’étendre la culture générale et littéraire de l’apprenant. La démarche (traditionnelle) est toujours la même : le texte, le vocabulaire et la grammaire, la traduct
... Show MoreAlthough text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m
... Show MoreThe widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show More