Preferred Language
Articles
/
jcoeduw-637
Nouniya for Ibn Zaidoun and Andalusia for Ahmed Shawqi, study balancing
...Show More Authors

The present paper talks about balance between two poems which are the Nouniya for Ibn Zaidoun and Andalusia for Ahmed Shawqi. This study is not claimed to be the first of its kind but we found some artistic aspects that deserve to stop at them. This what makes the two the focus of critics and scholars as well in addition to their emphasis on the unity of the human feelings and immortality through the poet's ability to employ those feelings and emotions in a way that it can express the human soul in every time and place. That is what we believe Ibn Zaidoun had reached in his poem. Therefore, the present paper has come into the conclusion that Ibn Zaydoon's Nouniya is better than Shawqi's Andalusia due to what we got through reading and analyzing an aspect of their poems. This preference can be summed up as follows:
- Ibn Zaidoun adopted the style of irony and holding diodes which is based on antimony and contrast between opposite sides in the poem (perhaps the expression through paradox is connected to the argumentative situation, time and the conflict through which it falls into)1. Therefore, the language of Ibn Zaidoun relying on irony in manifesting the psychological meaning in a complete picture is coupled a lot with the human action whichdraws its continuation through time and this has given it human dimensions and a continuous argumentation.
- The language of Ibn Zaidoun is a coherent language that expresses the nature of his era as he managed to adapt it to fit the emotional purposes that he wanted to express. Shawqi on the other hand used expressions that belonged to the pre-Islamic era. This forced us to go back to the dictionary to find out the meanings , i. e. , he did not bend the words to acquire new connotations so as to contribute to the development of the situation and content, a point to be considered for the poet.
- The poem of Ibn Zaidoun represented an integrated thematic unit from the beginning till the end, while Shawqi's poem was divided into sections, starting with parking on the ruins, descriptive parts, monologues, and conclusion.
The symbol in Ibn Zaidoun's poem acquired human dimensions, while Shawqi was characterized by locality in that the Sphinx symbolism was associated with Egypt. This is not compared to the beloved that expresses comprehensive human positions in every time and place. The symbol of the beloved for Ibn Zaidoun includes the entire poem while is confined to limited lines for Shawqi.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
Wavelet Analysis For Sunspot Time Series
...Show More Authors

Abstract

In this research we study the wavelet characteristics for the important time series known as Sunspot, on the aim of verifying the periodogram that other researchers had reached by the spectral transform, and noticing the variation in the period length on one side and the shifting on another.

A continuous wavelet analysis is done for this series and the periodogram in it is marked primarily. for more accuracy, the series is partitioned to its the approximate and the details components to five levels, filtering these components by using fixed threshold on one time and independent threshold on another, finding the noise series which represents the difference between

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2012
Journal Name
Journal Of Educational And Psychological Researches
Perceived Self-efficacy for university students
...Show More Authors

Research was: 1- known as self-efficacy when students perceived the university. 2- know the significance of statistical differences in perceived self-efficacy according to gender and specialty. Formed the research sample of (300) students were chosen from the original research community by way of random (150) male specialization and scientific and humanitarian (150) females specialized scientific and humanitarian. The search tool to prepare the yard tool to measure perceived self-efficacy based on measurements and previous literature on the subject of perceived self-efficacy. The researcher using a number of means, statistical, including test Altaúa and analysis of variance of bilateral and results showed the enjoyment of the research s

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
International Journal Of Chemical Engineering
Microbubble Distillation for Ethanol-Water Separation
...Show More Authors

In the current study, a novel approach for separating ethanol-water mixture by microbubble distillation technology was investigated. Traditional distillation processes require large amounts of energy to raise the liquid to its boiling point to effect removal of volatile components. The concept of microbubble distillation by comparison is to heat the gas phase rather than the liquid phase to achieve separation. The removal of ethanol from the thermally sensitive fermentation broths was taken as a case of study. Consequently the results were then compared with those which could be obtained under equilibrium conditions expected in an “ideal” distillation unit. Microbubble distillation has achieved vapour compositions higher than th

... Show More
View Publication
Scopus (20)
Crossref (15)
Scopus Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Sun Jun 04 2017
Journal Name
Baghdad Science Journal
Human Computer Interface for Wheelchair Movement
...Show More Authors

This paper aims to develop a technique for helping disabled people elderly with physical disability, such as those who are unable to move hands and cannot speak howover, by using a computer vision; real time video and interaction between human and computer where these combinations provide a promising solution to assist the disabled people. The main objective of the work is to design a project as a wheelchair which contains two wheel drives. This project is based on real time video for detecting and tracking human face. The proposed design is multi speed based on pulse width modulation(PWM), technique. This project is a fast response to detect and track face direction with four operations movement (left, right, forward and stop). These opera

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Tue Oct 19 2021
Journal Name
Big Data Summit 2: Hpc & Ai Empowering Data Analytics 2018 | Conference Paper
Deep Bayesian for Opinion-target identification
...Show More Authors

The use of deep learning.

View Publication
Publication Date
Mon Apr 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Result for the group SL(2,172)
...Show More Authors

Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Manufacturing electrolysis cell for hydrogen production
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Cognitive Behavioral Therapy for Internet Addicts
...Show More Authors

The study aims to explore the effect of cognitive behavioral therapy on internet addiction among university students. The experimental method was used. The study population consisted of (100) university students (50 males, 50 females). The Research sample included (13) University students at Baghdad University addicted to the Internet (9 males, 4 females), divided into two groups:  a control group consisting of (6) individuals (4 males, 2 females) and an experimental sample consisting of (6) individuals (4 males, 2 females). The Scale of Internet Addiction by Young (1996), which was translated and modified into the Arabic language by (Moegel and Prism, 2016), was administered to the study sample. The sample was subjected to two sess

... Show More
View Publication Preview PDF