Preferred Language
Articles
/
jcofarts-711
Performance analog features comedy in the play " AL makama ALWaasitiyyah": هنادي صلاح عزت
...Show More Authors

The Comedy of patterns dramas that gave Representative possibilities of advanced functionality and wide being dependent on the diversity performance piece , which is intended to provoke laughter at the receiver, through the diversity of genres performing between dancing and singing and Albantomaim and other methods that have made them distinct from the species dramas other being enabled Representative in dealing with all roles across mature and adaptation of his tools of physical and vocal , as the comedy discusses the societal issues many have a factor of psychological and behind their platforms as a tool face is not directly give way to vent citizen injustice and disadvantages of humans and these conditions need to techniques of physical and sound alert for I start action and reaction .The researcher found the results to some of them: -1-rely on the capabilities of Representative expressive physical and vocal performance in the comedy role for the production of speech and audio visual contents of an intellectual and aesthetic.2-enables the comedian of the diversity of verbal discourse between (poetry, prose and song) and this is what gives him wider areas in the multiplicity of meaning

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
College Of Islamic Sciences
Thematic consistency in Surat Al-Gashiyah
...Show More Authors

research aims: 1- Demonstrating an aspect of the rhetorical miracle of the Qur’an represented in the accuracy of its verses and the consistency of its topics. 2- Clarifying the intent of Surat Al-Ghashiya, and clarifying the link between the topics of the surah and its purpose. 3- Studying the topics included in Surat Al-Gashiya, and highlighting their consistency among them. 4- Referring to the gifts contained in the noble verses.Research Methodology: In preparing this study, I followed the inductive-analytical approach, according to the procedures outlined in the introduction.From the search results: 1- The purpose of Surat Al-Gashiya: Reminding the Hereafter and its scenes of reward

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
College Of Islamic Sciences
The efforts of Sheikh Al-Ahmadia
...Show More Authors

Abstract: Various peoples have contributed to building the Islamic civilization through the achievements and creativity of their scholars. In particular, the Kurdish scholars have provided new and great services to the Holy Qur’an that deserves attention. For example, it is no secret that Sheikh Ahmadian, with his interpretation, rendered a great service to the Glorious Book of God. His style is distinguished by modernity, seriousness and objectivity, and represents a lively response to the needs of the Kurdish Muslim people. Due to the importance of Ahmadian’s interpretation of the Qur’an, therefore, I have demonstrated his approach in this research in terms of dealing with his interpretation of the Qur’an with the Qur’an, the

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
The Egyptian Journal Of Hospital Medicine
Some Clinical Features of Trichomoniasis Associated with Pelvic Organs Tenderness in Sample of Iraqi women
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jul 30 2008
Journal Name
College Of Islamic Sciences
Al-Aini's grammatical responses to Ibn Malik in his book Umdat Al-Qari
...Show More Authors

It is from the greatness of God Almighty and from him that he facilitated for me to delve into the immersion of the hadith of the Prophet in my doctoral dissertation, then I found it a fertile ground for the cultivation of scientific results.
Through this work, I chose the topic (Replies of Al-Aini to Ibn Malik in his book Umdat Al-Qari Sharh Sahih Al-Bukhari) because of its scientific impact, as such topics inspire in the soul of the follower and the student a lot of contemplation and great care to understand the texts and then come up with a result that is almost close. It is correct, and my current situation in this research is the condition of many scholars, not without errors and omissions. Whatever was correct is by the grace of

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 04 2022
Journal Name
Al–bahith Al–a'alami
paratexte in specialized literary journals : AL ADEEB AL IRAQI magazine is a model
...Show More Authors

Post-structural critical studies highlighted the importance of studying the texts surrounding the text as an important part in the process of receiving and understanding texts, and although this topic was dealt with by the ancient Arabs and Europeans, interest in it appeared clearly after the appearance of Gerard Genet's book (SEUILS), which separated it Text Thresholds. Or what he called paratexte, and dealt with them with interest as he reads them on books. With the development of semiotic studies, interest in paratexte studies began in a broader way and in various literary and non-literary texts, including journalistic texts. And since specialized magazines are one of the press releases that enjoy their privacy in terms of topics and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
Exkursion in die arabische Exilliteratur mit bestimmten Dichtern von Al-Rabiṭa Al-Qalamiya
...Show More Authors

Unter Exilliteratur versteht man „die literarische Produktion von Autoren, die wegen politischer, religiöser oder rassistischer Verfolgung gezwungen sind, sich an einem anderen als dem von ihnen gewünschten Lebens- und Arbeitsort aufzuhalten.“[1] Deswegen unterscheidet sich „Migration“ von „Exil“ dadurch, dass sie freiwillige Auswanderung ist. Bereits in der Antike und auch im Mittelalter gab es Schriftsteller, die vor Zensur oder politischer Verfolgung ins Exil geflohen sind, wie zum Beispiel der griechische Satiriker des 

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Boundary & Geometric Region Features Image Segmentation for Quadtree Partitioning Scheme
...Show More Authors

In this paper, an efficient image segmentation scheme is proposed of boundary based & geometric region features as an alternative way of utilizing statistical base only. The test results vary according to partitioning control parameters values and image details or characteristics, with preserving the segmented image edges.

Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 02 2021
Journal Name
New Trends In Information And Communications Technology Applications: 4th International Conference, Ntict 2020, Baghdad, Iraq, June 15, 2020, Proceedings 4
Iris recognition using localized Zernike features with partial iris pattern
...Show More Authors