Arabic prose poem and the antithesis of contrast: poetry _ prose and West _ East
תקציר
השירה החילונית זו מיזגה בין התרבות היהודית והתרבות הערבית השלטת. התרבות הערבית השלטת השפיעה על היהודים בשירה, בספרי פילוסופייה ועיון, בהגות דתית, ביצירה של פרשנות המקרא, במחקר בדקדוק עברי, ברפואה ועוד. ספרי המדע המחקר והעיון נכתבו כולם בערבית. זו היתה שפת הדיבור בקהילות היהודיות. אבל השירה שהתפתחה, שירה אשר קבלה את יסודותיה מן השירה הערבית, שהגיעה לשיא בתקופה זאת – נכתבה כולה בעב
... Show Moreבמחקר זה אבקש לעסוק בתימת העקדה בשירתה של חוה פנחס כוהן. סיפור העקדה נבחר לעמוד בבסיסה של המחקר ממספר סיבות. ראשית, כיון שהסיפור הוא סיפור משמעותי, מאורע חשוב במסורת היהודית. שנית, כיוון שעניינו אותי מערכות היחסים השונות בסיפור. מערכת היחסים בין יהוה לאברהם, מערכת היחסים בתוך המשפחה ומערכת היחסים בין יצחק לאברהם. במערכות היחסים הללו משכו את תשומת לבי גם אותם דברים שאינם כתובים בתנ״ך (לדוגמה: מה הייתה תגובת שרה
... Show MoreThis research paper studies the alienation of the intellectuals in the modern novel through the study of two alienated characters, John Marcher in Henry James's The Beast in the Jungle, and Mr. Duffy in James's Joyce's "A Painful Case." As a result of the complexity of life in the industrial societies, the individuals, especially the intellectual ones, feel themselves unable to integrate into social life; they fear society and feel that it endangers their individuality and independence. Thus, these characters live on the fringe of the societ
... Show MoreThis study investigates the phonological adaptation of diphthongs within English loanwords in Iraqi Arabic (IA). In contrast to earlier small-scale descriptive studies, this study used quantitative content analysis to analyse 346 established loanwords collected through document review and direct observation to determine the diphthong adaptation patterns involved in the nativisation of English loanwords by native speakers of IA. Content analysis results revealed that most GB diphthong adaptations in English loanwords in IA occur in systematic patterns and thus may be ascribed to particular aspects in both L1 and L2 phonological systems. More specifically, the results indicate that the IA output forms tend to maintain the features of the GB i
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreDeaf and dumb peoples are suffering difficulties most of the time in communicating with society. They use sign language to communicate with each other and with normal people. But Normal people find it more difficult to understand the sign language and gestures made by deaf and dumb people. Therefore, many techniques have been employed to tackle this problem by converting the sign language to a text or a voice and vice versa. In recent years, research has progressed steadily in regard to the use of computers to recognize and translate the sign language. This paper reviews significant projects in the field beginning with important steps of sign language translation. These projects can b
Sentiment analysis is one of the major fields in natural language processing whose main task is to extract sentiments, opinions, attitudes, and emotions from a subjective text. And for its importance in decision making and in people's trust with reviews on web sites, there are many academic researches to address sentiment analysis problems. Deep Learning (DL) is a powerful Machine Learning (ML) technique that has emerged with its ability of feature representation and differentiating data, leading to state-of-the-art prediction results. In recent years, DL has been widely used in sentiment analysis, however, there is scarce in its implementation in the Arabic language field. Most of the previous researches address other l
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show More