Preferred Language
Articles
/
jcois-1070
The authority of the ancient text in the poetry of Bashar bin Bard
...Show More Authors

Abstract

Heritage represents the center around which poets revolve around and take advantage of its inexhaustible specific, and the connotations that this heritage holds of various values, values ​​and ideas, and the poet Bashar bin Bard from prominent poets who were inspired by that heritage and the culture of the first Abbasid era and whoever and others was worthy of studying and tracking his potentials and capabilities Creativity is based on the inspiration of the legacy of his predecessors, and the development of this legacy and renewal in it. The research methodology required its division into two topics, the first topic, a description of the beauty of women, a description of wine, while the second topic is a description of hatred and selfishness, a description of the night, a description of war and weapons, and a conclusion that included the most prominent results of the research that came Search by

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of The College Of Languages (jcl)
استنطاق النص الصوفي الأندلســــي
...Show More Authors

Heading of this research, to interrogate the text Sufi Andalusia, one of the displayed cognitive embodied the spirit of the experiment with Walsh nudity Sufi, who ascended to the world of spirituality within their experience of poetry, taking pictures of the perceived symbol cognitively carry through to the worlds transparent based Almwaged related Bashan soul and heart, has tried to invest communicative potential offered by .      

View Publication Preview PDF
Publication Date
Mon Feb 25 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effectiveness of the financial analysis in the statement of the ability of financial ratios in the detection of fraud in the financial reports of industrial companies
...Show More Authors

This research after financial ratios in the detection of fraud to the financial statements published which enables specialists from the work of their studies and their conclusions to obtain the information they seek on the activities of the entity. Has provided researchers what these relics They then field study to test the validity and sincerity of the findings of the suggestions that have been upheld the need to study all financial ratios extracted in general, organized and used in decision-making processes necessary administrative.And that the financial management attention more financial analysis and extraction of financial ratios and compare them with industry standards taken from historical norms

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
The Eloquence of the Sound in the Production of Mental Image in the Feature Film
...Show More Authors

The ideas and information obtained by the viewer in the cinema have always been the source of the visual image, but that doesn’t negate the fact that the mental image can produce a lot of the information and ideas in the cinematic art and the most important means to achieve this mental image in the film is the eloquent cinematic sound. This research is conducted to show this important and effective contribution of the sound in the production of the mental image. Hence the importance of this research is in that it addresses an important issue which is the eloquent performance of the sound and its role in the production of the mental image inside the space of the feature film. This research concerns those working the field of cinema and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 01 2016
Journal Name
Iraqi Journal Of Science
Efficient text in image hiding method based on LSB method principle
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere

... Show More
View Publication
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
An Improved Method for Hiding Text in Image Using Header Image
...Show More Authors

The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe

... Show More
View Publication
Crossref
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
Show fate to the people of Badr By Ibrahim ibn Hasan al-Kurani (1025-1101 AH): Study, investigate and comment
...Show More Authors

It is the grace of God and his grace that he accepts repentance for his slaves, forgives their bad deeds in return for their misfortune, or offers them a good deed, but pardons many of them for free. Therefore, it is not long for God Almighty to forgive His mercy for many of His slaves and bring them to Paradise with no punishment or punishment, even if they have committed some sins, because of the multitude of their favorable navigational disadvantages, or even without gratitude thanks to him and him. With all this, some have overlooked the old and new on these things and amazed at the hadeeth ((God may have seen the people of the full moon and said do what you want, I have forgiven you)). Therefore, the scholars tried to answer some of

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Theoretical And Applied Information Technology
Graph based text representation for document clustering
...Show More Authors

Advances in digital technology and the World Wide Web has led to the increase of digital documents that are used for various purposes such as publishing and digital library. This phenomenon raises awareness for the requirement of effective techniques that can help during the search and retrieval of text. One of the most needed tasks is clustering, which categorizes documents automatically into meaningful groups. Clustering is an important task in data mining and machine learning. The accuracy of clustering depends tightly on the selection of the text representation method. Traditional methods of text representation model documents as bags of words using term-frequency index document frequency (TFIDF). This method ignores the relationship an

... Show More
Preview PDF
Scopus (15)
Scopus
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
השירה החילונית לשמואל הנגיד בספרד Hebrew religious poetry to Shmuel Hnagad In Spain
...Show More Authors

תקציר

השירה החילונית  זו מיזגה בין התרבות היהודית והתרבות הערבית השלטת. התרבות הערבית השלטת  השפיעה על היהודים בשירה, בספרי פילוסופייה ועיון, בהגות דתית, ביצירה של פרשנות המקרא, במחקר בדקדוק עברי, ברפואה ועוד. ספרי המדע המחקר והעיון נכתבו כולם בערבית. זו היתה שפת הדיבור בקהילות היהודיות. אבל השירה שהתפתחה, שירה אשר קבלה את יסודותיה מן השירה הערבית, שהגיעה לשיא בתקופה זאת – נכתבה כולה בעב

... Show More
View Publication Preview PDF