Preferred Language
Articles
/
jcofarts-619
Anthropology and Representations of Magic in Arab Theatrical Text Harut and Marut's Play as a Model: وصال خلفة كاظم البكري
...Show More Authors

The research (Anthropology and Representations of magic in Arab Theatrical Text, Harut and Marut's play as a Model) is concerned with studying magic and the forms of its presence in the theatrical text in different human cultures where it belongs. The research consists of four chapters.
The first chapter includes the research problem that revolves around the following questions: (what is the mechanism of employing magic anthropology and its representations in the Arab theatrical text Harut and Marut's play as a model?), and the research importance which is attributed to the necessity of studying (magic) in the Arab theatrical text as it is considered the inauguration of one of the social phenomena that many researchers in the field of theatre had not been able to delve into it before. The need for this research stems from that fact that it will benefit the researchers and scholar in the colleges and institutes of fine arts and those working in the field of Theatrical literature, as well as determining the objective which focused on defining the subject of (Anthropology and Representations of Magic in Arab Theatrical Text, Harut and Marut's play as a Model). The limits have been determined: the temporal (1965), spatial (Egypt), objective (Anthropology and Representations of Magic in Arab Theatrical Text, Harut and Marut's play as a Model), in addition to the procedural definitions of the terms mentioned in the research title.
The second chapter (theoretical framework) consists of three sections, in addition to the indicators that stem from the theoretical framework. The researcher, in the first section, addressed: the emergence of magic in the ancient civilization. The researcher, in the second section, addressed the anthropology of magic. The third section is dedicated for studying magic in the world theatrical text. The third chapter is dedicated for the research procedures, wherein the research community which includes one research sample, i.e. a model for the research, has been determined, and the research sample which was limited to the play Harut and Marut by Ali Ahmad Bakathir in (1965). The researcher eventually came up with the results of the research sample analysis as follows:

1- The characters of the two (angels) are considered an extension of the cultural precipitate represented by the social systems and cultural layouts prevailing in the primitive societies where magic is considered a model for them.
2- The play dealt with two forms of magic manifested by the (black magic) embodied in (jinn) and (the two angels) that were clearly visible in strange phenomena, and the (white magic) manifested in its function, where it eliminated the invisible vicious forms.
The researcher, based on the results, made her conclusions, and presented a set of recommendations supported by some suggestions that she found complementary for the research. That was in the fourth chapter that the researcher dedicated for mentioning the above contents. The researcher also mentioned the list of resources.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Automation in architecture and its effect on the regeneration of traditional buildings: Al-Shawi House as a case study
...Show More Authors
Abstract<p>The increased applications of technology in the field of architecture, especially digital technology and aspects of automation, have made a major impact on various aspects of local architecture, especially the traditional ones. As these technologies have succeeded in integrating many technological applications in many traditional and heritage buildings and taking them to more complex uses. And included in it characteristics that were not contained, therefore the research problem was concentrated in the absence of a holistic view of the role of the aspects of automation as a technological and design effect and its mutual effects on traditional buildings (especially the traditional Bagh</p> ... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
Ideological Polarization as a Deception Strategy in the Discourse of American Think Tanks: A Critical Discourse Analysis
...Show More Authors

Deception is an inseparable facet of political discourse in attaining strategic political gains though compromising public opinion. However, the employment of discursive deception strategies by the policy-making institutions of think tanks has not received due attention in the literature. The current study aims at exploring how the ideologizing deception strategies are utilized by the conservative American think tank of the Washington Institute to reproduce socio-political realities and re-shape public opinion. To fulfill this task, van Dijk’s (2000) notion of ideological polarization which shows positive self-representation and negative other representation is adopted to conduct a critical discourse analysis of four Arabic texts relea

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Text Classification Based on Weighted Extreme Learning Machine
...Show More Authors

The huge amount of documents in the internet led to the rapid need of text classification (TC). TC is used to organize these text documents. In this research paper, a new model is based on Extreme Machine learning (EML) is used. The proposed model consists of many phases including: preprocessing, feature extraction, Multiple Linear Regression (MLR) and ELM. The basic idea of the proposed model is built upon the calculation of feature weights by using MLR. These feature weights with the extracted features introduced as an input to the ELM that produced weighted Extreme Learning Machine (WELM). The results showed   a great competence of the proposed WELM compared to the ELM. 

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 02 2019
Journal Name
Advances In Intelligent Systems And Computing
Spin-Image Descriptors for Text-Independent Speaker Recognition
...Show More Authors

Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Engineering
Spike neural network as a controller in SDN network
...Show More Authors

The paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Dec 12 2017
Journal Name
Al-khwarizmi Engineering Journal
Design a Vegetative Filter Strips Length Using VFSMOD_W Model for Reducing Sediments and Pesticides
...Show More Authors

 Abstract 

The vegetative filter strips (VFS) are a useful tool used for reducing the movement of sediment and pesticide in therivers. The filter strip’s soil can help in reducing the runoff volume by infiltration. However, the characteristics of VFS (i.e., length) are not recently identified depending on the estimation of VFS modeling performance. The aim of this research is to study these characteristics and determine acorrelation between filter strip length and percent reduction (trapping efficiency) for sediment, water, and pesticide. Two proposed pesticides(one has organic carbon sorption coefficient, Koc, of 147 L/kg which is more moveable than XXXX, and another one

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 10 2017
Journal Name
Journal Of The College Of Languages (jcl)
Technical methods in foreign language teaching as a new method in foreign language learning
...Show More Authors

Unter dem Titel " Technische Methoden im Fremdsprachunterricht als eine neueste Methode im Fremdsprachlernen, die Spiele als Muster"

versteht man, dass die Forschung  sich mit einer neuen Methoden im Fremdsprachunterricht beschäftigt. Von den neuen Methoden im Unterricht sind die Spiele. So man sieht  in den letzten Jahren viele Artikel zum Thema Spiele im Fremdsprschunterricht. Davon gehen wir aus, dass die Spiele im Unterricht eine groβe Rolle spielt, denn diese Methode macht Lust, Spaβ im Lernenprozeβ. Die Spiele im Unterricht bezeichnen als ein Mittel, um Unterricht etwas Schönes , Nützliches und Lebendigs zu sein. Die Spiele sind vielfälltig und unterscheidet sich nach den Themen und Materialien. In dieser F

... Show More
View Publication Preview PDF