The research deals with the lyrical introduction in the commentary of Tarfa bin al-Abd as a formative system characterized by flexibility and richness of imagination, which achieved a formative treatment and a unique construction within the structures of the structural and semantic language. I dealt with the poetic verses represented by the lyrical introduction as a formative hypothesis, basing its goal on a methodological framework distributed on the problem that was summarized by the following question: Is it possible to look at the poetic pattern within the pre-Islamic poem / hanging blinking as a model, in its plastic dimensions and to identify the stylistic treatment that achieves the formation space within the poetic text. The research was divided into an introduction and two chapters. The first dealt with the plastic structure and its artistic elements, and the second dealt with the life of the poet and his creative literary art. It also dealt with the analysis of the poetic text and the discovery of plastic treatment in it. The procedures ended with the most prominent results, including:
The poem was distinguished by the visual richness provided by the diversity of words and their sensory load that allows the reader's imagination to see the event as if it were just happening.The poetic text showed a flexible and abundant language in terms of vocabularies and meanings, as well as the advanced plastic pattern in the body of the poetic text. After that, the research monitored the general conclusions reached by the scientific research journey, and ended with an index of sources and a summary of the research in English.
The impact of mental training overlap on the development of some closed and open skills in five-aside football for middle school students, Ayad Ali Hussein, Haidar Abedalameer Habe
Background: Rehabilitation of the carious tooth to establish tooth structure integrity required cavity design that show a benign stress distribution. The aim of this study was to investigate the influence of the cavity position on the stress values in the reamining tooth structure restored with amalgam or resin composite. Materials and methods: Seven 2-D models of maxillary first premolar include class I cavity design was prepared, one sound tooth (A) 3 composite (B1, B2, and B3) and 3 amalgam (C1, C2, and C3). In design (BI and C1) the cavity position is in the mid distance between bacc-lingual cusp tip, design (B2 and C2) and (B3 and C3) shifted toward the buccal cusp and the lingual cusp for 0.5 mm respectively. One hundred N vertical
... Show MoreAutorías: Imad Kadhim Khlaif, Talib Faisal Shnawa. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 1, 2022. Artículo de Revista en Dialnet.
Abstract
The study aims to know the degree of secondary school managers' practice of servant leadership in Gaza from their teachers’ perspective. It further aims to examine whether there are any statistically significant differences at (α 0.05≥) between the means of the study sample’s members attributed to variables such as (gender, educational qualification, and years of experience). To achieve the objectives of the study, the study adopted the descriptive survey method, using a questionnaire consisting of (30) items distributed to four domains: (workers service, ethical dealing, motivation & influence, and building an organized, integrated society). Then, the questionnaire was distributed to t
... Show MoreThe fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t