The research addresses the feminist lament and its representations in the contemporary Arab theatrical text as one of the purposes of the Arabic poetry and its images, samples, and reasons developed and its incentives multiplied through different time periods in which a dramatic image and representations have been manifested that harmonized with the art of theatre. In order to shed light on these representations, this study has come to look for the representations of lament phenomenon in the Arab theatre texts.
The study consists of an introduction in which the two researchers put forward the research problem, significance and objectives, and a theoretical framework which tackles a theoretical foundation for the research consisting of two sections: the feminist lament a historical view and the second section: lament in the theatre. The two researchers came up with a set of indicators adopted in the analysis of the research sample which was determined by (Al-Khansaa') play by the writer (Mohamed Saleh Ramadan) which agrees with the research objective. After the analysis, the researchers reached at a set of results among them: most of Al-Khansaa' lament is represented by mourning the dead and embodying them through images of sadness and grief.
The research is summarized in the construction of a mathematical model using the most common methods in the science of Operations Research, which are the models of transportation and linear programming to find the best solution to the problem of the high cost of hajj in Iraq, and this is done by reaching the optimum number of pilgrims traveling through both land ports and the number Ideal for passengers traveling through airports by Iraqi Airways, instead of relying on the personal experience of the decision-maker in Hajj and Umrah Authority by identifying the best port for pilgrim's travel, which can tolerate right or wrong, has been based on scientific methods of Operations Research, the researcher built two mathematical models
... Show MoreReducing the drag force has become one of the most important concerns in the automotive industry. This study concentrated on reducing drag through use of some external modifications of passive flow control, such as vortex generators, rear under body diffuser slices and a rear wing spoiler. The study was performed at inlet velocity (V=10,20,30,40 m/s) which correspond to an incompressible car model length Reynolds numbers (Re=2.62×105, 5.23×105, 7.85×105 and 10.46×105), respectively and we studied their effect on the drag force. We also present a theoretical study finite volume method (FVM) of solvi
The huge amount of documents in the internet led to the rapid need of text classification (TC). TC is used to organize these text documents. In this research paper, a new model is based on Extreme Machine learning (EML) is used. The proposed model consists of many phases including: preprocessing, feature extraction, Multiple Linear Regression (MLR) and ELM. The basic idea of the proposed model is built upon the calculation of feature weights by using MLR. These feature weights with the extracted features introduced as an input to the ELM that produced weighted Extreme Learning Machine (WELM). The results showed a great competence of the proposed WELM compared to the ELM.
The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.
Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.
To send any message text the sender converts message to ASCII c
... Show MoreBuilding a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreThe data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show MoreExchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha
... Show MoreThe irony pushes us to inquire about what is in the text of contradiction, irony, suspense, and other acts of paradox, as well as a departure from what is logical, or familiar, that attracts the attention of the addressee, and this is what drives us to introspect the text and interrogate it in order to get to know the intended product of the text or its real or metaphorical intent. On the other hand, the irony is more in the literary text than in the scientific texts. Therefore, critics add the word literature to it in their definition.
As it is represented by the paradox, we will seek to study the paradox of the title and the problematic that it may pose as the beginning of the text, and i
... Show More