Preferred Language
Articles
/
jcofarts-596
Dramatic Construction in Quranic Text Surah Taha – A model: جبار خماط حسن
...Show More Authors

There are many varied studies that dealt with the dramatic construction, especially books and studies that addressed drama in its construction and the method of writing it, that no textbook or a general cultural content is void of tackling the dramatic text in its construction and how the dramatic action develops in it. Therefore, a question occurs to the mind about the feasibility of dealing with the dramatic construction in this time, where many contemporary studies of dramatology and its relation and the contemporary critical directions are accumulating. This question many have two realistic aspects, yet the novelty and originality that this research shows lie in addressing a refined linguistic text in its style and connotations, such as rhetoric, communication and life that the holy Quran contains, and what its surahs talk about such as the history and conditions of the bygone nations and the lessons that we derive from the previous peoples. The holy Quran, a wonderful statement in its creativity and writing, is addressed by the researcher as a dramatic text that has an internal construction in the development and management of the internal power of events in a refined dramatic construction through a developing strategy inside the research which started by the methodological framework, and the research problem and the importance of addressing this problem, in addition to the objectives that we seek, passing through the identification of the terms. Then, the research, in its first section, addresses the theoretical framework, which tackles the concept of dramatic construction and its development inside the dramatic text. The second section deals with the research procedures by adopting the descriptive analytic approach and addressing the research sample represented by the blessed surah Taha. Then we conclude the research with the results and conclusions and a list of resources.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Use A State Space Model and Forecast House Prices in Baghdad.
...Show More Authors

The purchase of a home and access to housing is one of the most important requirements for the life of the individual and the stability of living and the development of the prices of houses in general and in Baghdad in particular affected by several factors, including the basic area of the house, the age of the house, the neighborhood in which the housing is available and the basic services, Where the statistical model SSM model was used to model house prices over a period of time from 2000 to 2018 and forecast until 2025 The research is concerned with enhancing the importance of this model and describing it as a standard and important compared to the models used in the analysis of time series after obtaining the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Engineering
Intelligence in Construction between Contemporary and Traditional Architecture
...Show More Authors

The authentic traditional architecture proved that it is very convenient to the environmental and social regulations where it appeared and lasted for hundred of years.

This traditional architecture got the intelligence in providing thermal comfort for their occupants by the intelligent usage of the building materials and the intelligent planning and designs which took in consideration the climatic condition and the aerodynamics of the whole city as one ecological system starting from the cold breeze passing through its narrow streets till it enters the dwelling units and glides out through the wind catchers.

This architecture had been neglected and replaced by modern imported architecture which had collap

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of The College Of Languages (jcl)
استنطاق النص الصوفي الأندلســــي
...Show More Authors

Heading of this research, to interrogate the text Sufi Andalusia, one of the displayed cognitive embodied the spirit of the experiment with Walsh nudity Sufi, who ascended to the world of spirituality within their experience of poetry, taking pictures of the perceived symbol cognitively carry through to the worlds transparent based Almwaged related Bashan soul and heart, has tried to invest communicative potential offered by .      

View Publication Preview PDF
Publication Date
Mon Sep 25 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Combining a Hill Encryption Algorithm and LSB Technique With Dispersed Way for Securing Arabic and English Text Messages Hidden in Cover Image
...Show More Authors

         In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate      ( 75-86) that differentiates according to  length of message and image resolution

View Publication Preview PDF
Publication Date
Sun Sep 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Combining a Hill Encryption Algorithm and LSB Technique With Dispersed Way for Securing Arabic and English Text Messages Hidden in Cover Image
...Show More Authors

         In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate      ( 75-86) that differentiates according to  length of message and image resolution.

View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Jan 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Text Classification Based on Weighted Extreme Learning Machine
...Show More Authors

The huge amount of documents in the internet led to the rapid need of text classification (TC). TC is used to organize these text documents. In this research paper, a new model is based on Extreme Machine learning (EML) is used. The proposed model consists of many phases including: preprocessing, feature extraction, Multiple Linear Regression (MLR) and ELM. The basic idea of the proposed model is built upon the calculation of feature weights by using MLR. These feature weights with the extracted features introduced as an input to the ELM that produced weighted Extreme Learning Machine (WELM). The results showed   a great competence of the proposed WELM compared to the ELM. 

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Oct 30 2008
Journal Name
College Of Islamic Sciences
The love of the world and its lusts The preference and bliss of the Hereafter In Surat Al-Imran: "objective study"
...Show More Authors

The love of the world and its lusts are the head of sins and the corruptors of religion, and the one who loves and loves them who prefers them over the hereafter is one of the most pitiful of creation, and the least intelligent of them, as he prefers imagination over reality, sleep over wakefulness, fleeting shadow over eternal bliss and the mortal abode over the eternal abode, and he sold the life of eternity for the most luxurious life. In life, it is dreams and sleep or as a fleeting shadow, and as it was said: The intelligent person is not deceived.
The reason for choosing this topic is due to two things:
The first: When I contemplated the reasons for the differences and conflicts that afflicted our wounded and occupied country

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 15 2021
Journal Name
The Journal Of Legal And Social Sciences
Limitations on the authority of a judge in case-law ( France as a model )
...Show More Authors

When exercising their authority in the jurisprudence, judges are subject to a set of restrictions that they must adhere to, as they do not want their jurisprudence to be accepted and welcomed by law practitioners in general, and legal scholars in particular, and in contrast to it, the arrows of criticism and defamation will extend to that jurisprudence, and then they will have to reverse them . Perhaps the most important of those restrictions imposed on judges is their observance of justice between the parties to the lawsuit through their lack of bias for one of the parties at the expense of the other, in addition to their observance of public order and public morals, as well as their observance of the legal texts that they work under its u

... Show More
View Publication