Preferred Language
Articles
/
jcoeduw-329
The Phonological and Suggestive Rhythm in the Context of the Quranic Text: The Phonological and Suggestive Rhythm in the Context of the Quranic Text
...Show More Authors

Abstract
The perpetuity of the Quranic discourse required being suitable for all ages.
Accordingly, the method of the Glorious Quran a pre request for the conscious
investigation and realization in order to detect the core of the texts, as the Quranic
discourse is considered a general address for the humanity as a whole. For this
reason, the progress of the concerned studies neceiated that it should cope with the
current development in the age requirements and its cultural changes within ages.
The texts of the Glorious Quran lightened the human reason as being the
Creator’s miracle for it is characterized by certain merits that makes it different from

poetry and prose. It is a unique texture in its rhetoric and composition. So, the
modern studies in reading the Quranic text, there is specific spectacle, but there must
be an analytical reading for its texts and investigating its components to reach to the
variety in its meanings and significations of its Quranic words.
The language of the discourse or the architecture of the text and its geometry
depend on its textual construction composed of a group of different, topics and
styles. The latter has suggestive significations preparing the shades of meanings
while it is in fact hidden and becomes apparent by the context and its situation.
There are certain utterances that draw the picture of the text not by its decadness
but by its shades and special suggestions that cannot be felt only by the expert.
For this reasons, the present study came as an attempt to detect and show the
aesthetics of the Quranic text, its miraculous geometry and its expressive and
performing power representing the rhythmic and phonological side. The latter is quite
apparent in the Quranic structure of every sura. Beside, it is a study that investigates
the internal movement of the rhythm and suggestion of the utterances themselves.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 19 2013
Journal Name
Journal Of Semitic Studies
An Aramaic Incantation Text
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Mon Jan 23 2023
Journal Name
Arab Science Heritage Journal
الممكنات الإنجازية في أدوار الحوار القرآني
...Show More Authors

    The science of The facts basically depends on the intentions of the speaker and what he deliberately waves to the interlocutor, taking into account the context in which the verbal act was received .

View Publication Preview PDF
Publication Date
Mon Dec 26 2022
Journal Name
Arab Science Heritage Journal
الممكنات الإنجازية في أدوار الحوار القرآني
...Show More Authors

The science of The facts basically depends on the intentions of the speaker and what he deliberately waves to the interlocutor, taking into account the context in which the verbal act was received .

View Publication Preview PDF
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding text in gray image using mapping technique
...Show More Authors

Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of The College Of Languages (jcl)
Le Français dans le contexte irakien
...Show More Authors

L'ouverture des frontières et la mondialisation des échanges,comme les projets de l'intégration font de la connaissance de langue un enjeu essentiel ,professionnel et culturel,pour le citoyen de demain.

L'Irak est un pays Anglophone où domine l'anglais,le français est considérée comme deuxième langue étrangère en Irak.

Notre mini-mémoire se compose de deux parties.Dans la première partie nous essayons d'examiner la place du français en Irak qui nous dirige à savoir pourquoi on apprend le français en Irak et qui l'apprend?Est –ce qu'il y a une coopération française?

Dans la deuxième partie nous examinons les problèmes du français en Ir

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of The College Of Languages (jcl)
استنطاق النص الصوفي الأندلســــي
...Show More Authors

Heading of this research, to interrogate the text Sufi Andalusia, one of the displayed cognitive embodied the spirit of the experiment with Walsh nudity Sufi, who ascended to the world of spirituality within their experience of poetry, taking pictures of the perceived symbol cognitively carry through to the worlds transparent based Almwaged related Bashan soul and heart, has tried to invest communicative potential offered by .      

View Publication Preview PDF