Preferred Language
Articles
/
jcoeduw-969
The Romantic Nightingale between Coleridge’s Divergence and Keats’ Adherence: A comparative Study between Coleridge’s ‘The Nightingale’ and Keats’ ‘Ode to a Nightingale’
...Show More Authors

‘Ode to a Nightingale’(1819) is a typical poem of a Romantic poet like John Keats, but
‘The Nightingale’(1798) is an uncharacteristic poem of a Romantic poet like Coleridge.
The paper proposes a comparison between Coleridge’s ‘The Nightingale’ and Keats’
‘Ode to a Nightingale’.Coleridge’s poem diverges from the Romantic norm; it carries some
characteristics new to Romantic poetry like the realistic and objective portrayals of nature and
the nightingale, while Keats’ poem adhere to the characteristics of Romantic poetry; it
portrays nature and the nightingale subjectively and unrealistically. Coleridge’s poem is very
much influenced by the scientific approaches to environment, and natural history which have
emerged at the end of the 18th C., and this influence has led Coleridge to diverge from the
Romantic norm, while Keats’ Ode does not react to this emergence, it preserves the prominent
features of Romantic poetry, though it follows Coleridge’s poem in not more than twenty one
years.
The paper is divided into two sections, and a conclusion. The first section, ‘Coleridge’s
Divergence from the Romantic Norm’starts with presenting Coleridge as the conventional
Romantic poet who is not different from Keats nor any other major Romantic poet in
depicting nature and the nightingale in most of his poems, with the aim to highlight his
sudden divergence from his Romantic line in ‘The Nightingale’. The part moves to discuss
Coleridge’s abandonment of the characteristics previously mentioned of Romantic poetry in
his ‘The Nightingale’ through his realistic and objective approaches to the nightingale which
come as a reaction to the occurrence of natural and ornithological studies.
The second section, ‘Keats’ Adherence to the Romantic Norm’ discusses Keats’
preservation of the prominent characteristics of Romantic poetry in his ‘Ode to a Nightingale’
like escapism, allusion, imitation of Milton, the unrealistic and subjective approaches to
nature and the nightingale,and degenderization of the nightingale which all point out Keats’
disregard for the occurrence of scientific approaches to nature and the bird at the time.
Finally, the conclusion sums up the findings of the study.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
Removing of Hexavalent Chromium from Aqueous Solutions Using Dried Yogurt, and Studying Isotherm, Kinetic and Thermodynamic Parameters
...Show More Authors

     In this study, Yogurt was dried and milled, then shaked with distilled water to remove the soluble materials, then again dried and milled. Batch experiments were carried out to remove hexavalent chromium from aqueous solutions. Different parameters were optimized such as amount of adsorbent, treatment time, pH and concentration of adsorbate. The concentrations of Cr6+ in solutions are determined by UV-Visible spectrophotometer.  Maximum percentage removal of Cr6+ was 82% at pH 2. Two equilibrium adsorption isotherms mechanisms are tested Langmuir and Freundlich, the results showed that the isotherm obeyed to Freundlich isotherm. Kinetic models were applied to the adsorption of Cr6+ ions on the adsorbents, ps

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
An exploratory study of history-based test case prioritization techniques on different datasets
...Show More Authors

In regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 16 2019
Journal Name
Al–bahith Al–a'alami
press Coverage Of Youth Social Problems An analytical Study of Al- Sabah Newspaper
...Show More Authors

The tremendous political transformations that took place in Iraq after 2003 led by the USA and its allies led to a change of its political system under the slogan of liberating Iraq from dictatorship, establishing a democratic system and spreading freedom among members of the society.
However, democracy was a mantle under which the US intended to achieve its expansionist ambitions in the region. It did not come to liberate Iraq as it claimed, but it occupied Iraq and all its materialistic and human resources. Thus, this change resulted in lots of negative events and societal pests that affected the entire social system and values. Youth is an important segment; it is one of the most affected age groups with the happenings and accident

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2<sup>m</sup>) using FPGA by exponentiation to (2<sup>k</sup>)
...Show More Authors

Crossref (1)
Crossref
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2<sup>m</sup>) using FPGA by exponentiation to (2<sup>k</sup>)
...Show More Authors

Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jun 21 1930
Journal Name
College Of Islamic Sciences
Quelques raisons du total et son impact sur l'interprétation du Coran: Study of explanatory models
...Show More Authors

The reasons for the totality are varied and multiple, some of which are attributed to the methods of the Arabic language as the participant
Verbal and omnipotent differences in the oud of conscience, which are comprehensive reasons for language in all
And some of these reasons are due to the sciences of the Qur'an, such as cessation and initiation
The explanation of the explanation for the multiplicity of words and differences in them, which necessarily led to a dispute jurisprudence
Linked to the origin of disagreement in the interpretation of the totality and its orientation and understanding and to summarize this subject and diverge
Parts and vocabulary did not receive the necessary care and did not absorb the lesson an

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Alternative security solutions offered by virtual private network vpn model proposal to use alternatives to Cisco and Microsoft security in al-rasheed bank-delegate general office- northern region
...Show More Authors

The study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.

The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
College Of Islamic Sciences
The jurisprudential aspects of Imam Abu al-Fayyadh al-Basri And its impact on the Shafi’i school of thought, on the rulings of worship
...Show More Authors

 

Summary of the jurisprudence research

  Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of the Messengers, our master Muhammad, and upon his pure family, and his ignorant and ignorant companions, and those who followed them in goodness until the Day of Judgment.

 Then:

 The many jurisprudential aspects that the Shafi’i imams said are of great importance, because these aspects are nothing but the opinions of venerable jurists who have reached a high degree of knowledge until they have become among the owners of faces. And among them are the Shafi’i jurists, the jurists may differ among themselves, either because there is no text about their imam in a

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
The construction of Complete (kn,n)-arcs in The Projective Plane PG(2,5) by Geometric Method, with the Related Blocking Sets and Projective Codes
...Show More Authors

A (k,n)-arc is a set of k points of PG(2,q) for some n, but not n + 1 of them, are collinear. A (k,n)-arc is complete if it is not contained in a (k + 1,n)-arc. In this paper we construct complete (kn,n)-arcs in PG(2,5), n = 2,3,4,5, by geometric method, with the related blocking sets and projective codes.

View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Nature Environment And Pollution Technology
The Kinetic Model for Decolourization of Commercial Direct Blue 2 Azo Dye Aqueous Solution by the Fenton Process and the Effect of Inorganic Salts
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref