Phonetics has close relevance with Musicology; in this study I decided explaining the interlinkages and harmony between Phonetics and Musicology. Linguists preceded philosophers in an attempt to link Phonetics with Musicology; the 1st serious attempt to link Phonetics with Musicology was done by Ibn Jeny (Dead 392 IC), but the real attempt is found with Farabi through his book under title Al Musiqa Al Kabeer, he defined music and link it with tune and relation between melody and tone, This is the same as pointed out by Ikhwan Al Safa who followed the doctrine of al-Farabi, their attention was with music and link it with phoneme, as they made music independent science, and they created special mathematics rules for it. Melody in music cannot be studied in separately from toning; therefore we can find correlation between melody and toning in Phonetics, so it is impossible talking about the melody in the framework of the single tone, it is seen as part of a group ringtones, while toning can be talking about in the framework of the single word, therefore melody and toning can be in the something bigger, al-Farabi and Ikhwan Al Safa who pointed out to this point, but the rhythm is linked with phenomena above syllabic like accent, tuning, dedication, moreover explaining resonant phoneme in melody as its properties of phonetics, The phonic lesson of al-Farabi and Ikhwan Al Safa was musician lesson purely ٚ mixed with the phoneme and music elements together.
The aim of the research is to use the data content analysis technique (DEA) in evaluating the efficiency of the performance of the eight branches of the General Tax Authority, located in Baghdad, represented by Karrada, Karkh parties, Karkh Center, Dora, Bayaa, Kadhimiya, New Baghdad, Rusafa according to the determination of the inputs represented by the number of non-accountable taxpayers and according to the categories professions and commercial business, deduction, transfer of property ownership, real estate and tenders, In addition to determining the outputs according to the checklist that contains nine dimensions to assess the efficiency of the performance of the investigated branches by investing their available resources T
... Show MoreOnline service is used to be as Pay-Per-Use in Cloud computing. Service user need not be in a long time contract with cloud service providers. Service level agreements (SLAs) are understandings marked between a cloud service providers and others, for example, a service user, intermediary operator, or observing operators. Since cloud computing is an ongoing technology giving numerous services to basic business applications and adaptable systems to manage online agreements are significant. SLA maintains the quality-of-service to the cloud user. If service provider fails to maintain the required service SLA is considered to be SLA violated. The main aim is to minimize the SLA violations for maintain the QoS of their cloud users. In this res
... Show MoreA simile is a figure of speech that draws resemblance with the help of the words such as (like) or any other closer in meaning word. The present paper deals with the theme of a simile in the poetry of Khwaju Kermani, a truly great Persian poet.
Besides being a great poet, Khwaju Kermani was also a fine professor of sciences. He was, also, known by his ghazals in which he imitated and was influenced by two of the most immense poets (Saadi) and (Hakim Sanai).
The search for knowledge, the pursue of studies and interpretation are among the main themes of Khwaju Kermani’s poetry. He uses ghazals to express love and longing in a mystical manner.
The present paper discusses the poet’s life, ethics and works.&n
... Show MoreThe aim of the research is to diagnose the level of awareness and response of the researched sample to the concept of enlightened leadership and strategic alignment, as well as to measure the strength and weakness of the relationships between the independent variable of enlightened leadership and the dependent variable of strategic alignment with its dimensions. Thus, the research problem was defined by the main question of identifying the role played by enlightened leadership in achieving strategic alignment in a number of private Iraqi commercial banks. In light of this, the hypothetical research model was designed, embodying the relationship between the research variables. The descriptive analytical approach was adopted, and a ques
... Show MoreThese days, it is crucial to discern between different types of human behavior, and artificial intelligence techniques play a big part in that. The characteristics of the feedforward artificial neural network (FANN) algorithm and the genetic algorithm have been combined to create an important working mechanism that aids in this field. The proposed system can be used for essential tasks in life, such as analysis, automation, control, recognition, and other tasks. Crossover and mutation are the two primary mechanisms used by the genetic algorithm in the proposed system to replace the back propagation process in ANN. While the feedforward artificial neural network technique is focused on input processing, this should be based on the proce
... Show MoreObjective: The study aimed to assess Leucine-rich alpha-2-glycoprotein-1 biomarker serum level in hospitalized COVID-19 patients. Methods: The case control study from multi-centers in Baghdad included 45 adult patients (19 females and 26 males) with COVID-19, diagnosed with a positive real-time reverse transcription polymerase chain reaction and excluded negative RT-PCR for COVID-19 and comorbidity conditions. Second group, was 43 control (20 females and 23 males). Results: This study found a decrease Leucine-rich alpha-2-glycoprotein-1 biomarker serum level in these patients and a significant difference in D. dimer, neutrophil count, lymphocyte count, and the neutrophil-lymphocyte ratio between the patients and controls at a P valu
... Show MoreAbstract:- Cyberspace is a new arena for conflict between international powers, especially since the cost of cyber-conflict is less than its traditional warfare counterparts regardless of the nature of the weapons used, whether traditional or non-traditional. Cyber conflict is necessarily based on strategies to deter, attack, and defend. The aim of the cybercrime conflict is to ensure the defensive sufficiency of the state, ensuring its national security and safeguarding its supreme interests. Despite Japan-China relations characterized by convergence and cooperation in post-Cold War economic spheres, Japan continues to retain the growing Chinese influence in East Asia. These variables prompted Japan to announce a hedging strategy due to un
... Show MoreSchool administration has an effective role in stimulating academic achievement, as it is the ideal regulation and activation of material and human power to achieve the goals of the educational process. This role has axes in the form of interests, aids, and specific procedures exercised by the school administration in improving the educational process, and assisting researchers in achieving the highest levels of academic achievement. This activation is achieved through stages of planning, organizing, coordinating, and evaluating.
To achieve the aims of this research, the researcher pursued the descriptive analytical approach, which is considered one of the most appropriate approaches to the nature of this type of research. The qu
... Show MoreIn this study, simply supported reinforced concrete (RC) beams were analyzed using the Extended Finite Element Method (XFEM). This is a powerful method that is used for the treatment of discontinuities resulting from the fracture process and crack propagation in concrete. The mesoscale is used in modeling concrete as a two-phasic material of coarse aggregate and cement mortar. Air voids in the cement paste will also be modeled. The coarse aggregate used in the casting of these beams is a rounded aggregate consisting of different maximum sizes. The maximum size is 25 mm in the first model, and in the second model, the maximum size is 20 mm. The compressive strength used in these beams is equal to 26 MPa.
The subje
... Show MoreThe research aims to know the traits or characteristics of woman in terms of her external
appearance, motives for her behavior, feelings, mood and ability.
It, moreover, seeks woman’s relationship with others as it is presented by the Iraqi
satirical television show “ State of Melon “.
The researcher adopted for that survey approach using the method of content analysis
to study the research sample represented by “ State of Melon “ show which was
exposed through the screen of a group of channels:
“Hona Baghdad Satellite Channel, then Asia Satellite Channel, Dijla Satellite Channel,
and UTV Satellite Channel.”For this, the researcher used Margaret Gallagher’s Model to analyze the image of
woman in