The research deals with the lyrical introduction in the commentary of Tarfa bin al-Abd as a formative system characterized by flexibility and richness of imagination, which achieved a formative treatment and a unique construction within the structures of the structural and semantic language. I dealt with the poetic verses represented by the lyrical introduction as a formative hypothesis, basing its goal on a methodological framework distributed on the problem that was summarized by the following question: Is it possible to look at the poetic pattern within the pre-Islamic poem / hanging blinking as a model, in its plastic dimensions and to identify the stylistic treatment that achieves the formation space within the poetic text. The research was divided into an introduction and two chapters. The first dealt with the plastic structure and its artistic elements, and the second dealt with the life of the poet and his creative literary art. It also dealt with the analysis of the poetic text and the discovery of plastic treatment in it. The procedures ended with the most prominent results, including:
The poem was distinguished by the visual richness provided by the diversity of words and their sensory load that allows the reader's imagination to see the event as if it were just happening.The poetic text showed a flexible and abundant language in terms of vocabularies and meanings, as well as the advanced plastic pattern in the body of the poetic text. After that, the research monitored the general conclusions reached by the scientific research journey, and ended with an index of sources and a summary of the research in English.
In this work, lead oxide nanoparticles were prepared by laser ablation of lead target immersed in deionized water by using pulsed Nd:YAG laser with laser energy 400 mJ/pulse and different laser pulses. The chemical bonding of lead oxide nps was investigated by Fourier Transform Infrared (FTIR); surface morphology and optical properties were investigated by Scanning Electron Microscope (SEM) and UV-Visible spectroscopy respectively, and the size effect of lead oxide nanoparticles was studied on its antibacterial action against two types of bacteria Gram-negitive (Escherichia coli) and Gram-positive (Staphylococcusaurus) by diffusion method. The antibacterial property results show that the antibacterial activity of the Lead oxide NPs was
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreAbstract
Itraconazole is a triazole antifungal given orally for the treatment of oropharyngeal and vulvovaginal candidiasis, for systemic infections including aspergillosis, candidiasis, and for the prophylaxis of fungal infections in immunocompromised patients.
The study aimed to formulate a practical water-insoluble Itraconazole, with insufficient bioavailability as nanosuspension to increase aqueous solubility and improve its dissolution and oral bioavailability.
Itraconazole nanosuspension was produced by a
... Show MoreDuring the last few years, the greener additives prepared from bio-raw materials with low-cost and multifunctional applications have attracted considerable attention in the field of lubricant industry. In the present work, copolymers derived from sunflower and linseed oils with decyl methacrylate were synthesized by a thermal method using benzoyl peroxide (BPO) as a radical initiator. Direct polymerization of fatty acid double bonds in the presence of a free radical initiator results in the development of environmentally friendly copolymeric additives (Co-1 and Co-2). Fourier Transform Infrared (FTIR) and Proton Nuclear Magnetic Resonance (1H-NMR) were used to characterize the resulting copolymers. Thermal decomposition of copolymers was de
... Show MoreEndophytic fungi live inside plants or any part of them without creating any visible pathogenic signs. Endophytic fungi are found within medicinal plants and have shown strong biologic activity, such as anticancer and antioxidant activities, as well as producing extracellular enzymes. In this study, different fungal strains were isolated from the leaves of the medicinal plant Ziziphus spina, including Aspergillus flavus, Aspergillus fumigatus, Aspergillus niger, Cladosporium sp., Rhizopus sp., and Mucor sp. Extracellular enzymes have been quantified using agar plate-based methods in which fungi were grown in specified growth media to detect the enzymes produced. The results showed that A. niger has the highest ability to produce amy
... Show MoreSildenafil, tadalafil, and vardenafil are phosphodiesterase type 5 enzyme (PDE-5) inhibitors used for the treatment of male erectile dysfunction. This present study aims to investigate 55 herbal products indicated for men’s sexual health from the Malaysian market for adulteration of PDE-5 inhibitors and analogues. The screening and identification of 20 PDE-5 inhibitors and analogues in herbal products of various forms (powder, capsules, tablets, and pastels) were conducted using gas chromatography–electron impact-mass spectrometer (GC-EI-MS). The analysis has shown that 19 herbal products were adulterated with PDE-5 inhibitors and analogues. Unique ion fragmentations and the presence of molecular
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the