Preferred Language
Articles
/
jcois-1232
Two Poets Alandaluian Abu Al Makshi and His Douter Hasana
...Show More Authors

Andalusian literature is a literature in itself that is influenced and influenced, and it did not come out of thin air. Muslim Arabs came from the East to this country for jihad and a desire to live, and they carried with them their beliefs, customs and traditions. They must blend in the new element and its environment, so interference, fusion, diversity and influence actually took place.
It seems to us that the Arabs in the era of the governors in Andalusia (92-138 AH) strived hard to preserve everything that is Eastern. Literature is an oriental model in the content of prose and poetry, but in the era of the Umayyad emirate, we will notice that the environment, the development of ages, and the mixing of civilizations have an effect on a new emergence of poetry and prose in terms of ideas and topics. Poetry was the most responsive field, employment and speed. His verses are a model for presenting topics and creating images and meanings in a way that simulates the Andalusian environment.
The research aims to deal with the life of the poet the father, analyzing his verses, clarifying the new topics that he introduced, and then analyzing the life of the poetess daughter and revealing the face of the poetic relationship and her father. The induction concluded that there is a close relationship between the two poets in the purpose and rhyme of poetry.
In view of the scarcity of the sources that have been translated for them and their scarcity, the research recommended that extensive studies be prepared on the subject of the research and to return to manuscripts that have not yet been verified.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Study of the Singlet and the Triplet States of Two ElectronSystems in the First Excited State
...Show More Authors

A study of the singlet and triplet states of two electron systems in the first excited state was performed using a simple quantum mechanical model, which assigns the 1s,and 2s orbital with two different variational parameters. Our results agree with a high level calculation used by Snow and Bills.

View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Engineering
Simulation and Experimental Walking Pattern Generation for Two Types of Degrees of Freedom Bipedal Locomotion Robot
...Show More Authors

Humanoids or bipedal robots are other kinds of robots that have legs. The balance of humanoids is the general problem in these types when the other in the support phase and the leg in the swing phase. In this work, the walking pattern generation is studied by MATLAB for two types of degrees of freedom, 10 and 17 degrees of freedom. Besides, the KHR-2HV simulation model is used to simulate the experimental results by Webots. Similarly, Arduino and LOBOT LSC microcontrollers are used to program the bipedal robot. After the several methods for programming the bipedal robot by Arduino microcontroller, LOBOT LSC-32 driver model is the better than PCA 96685 Driver-16 channel servo driver for programming the bipedal walking rob

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (29)
Crossref (15)
Scopus Crossref
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Synthesis, Characterization and Antimicrobial Evaluation for New Esters Derivatives Containing Two 1, 3, 4-Oxadiazole Units
...Show More Authors

     This work includes the synthesis of new ester compounds containing two 1,3,4-oxadiazole rings, 15a-c and 16a-c. This was done over seven steps, starting with p-acetamido-phenol 1 and 2-mercaptobenzoimidazole 2. The structure of the products was determined using FT-IR, 1H NMR, and mass spectroscopy. The evaluation of the antimicrobial activities of some prepared compounds was achieved against four types of bacteria (two types of gram-positive bacteria; Staphylococcus aureus and Bacillus subtilis, and two types of gram-negative bacteria, Pseudomonas aeruginosa and E. Coli), as well as against one types of fungus (C. albino). The results show moderate activit against the study bacteria, and the theoretical analysis of the toxi

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jan 28 2014
Journal Name
Journal Of Energy And Power Engineering
Comparison between Two Vertical Enclosures Filled With Porous Media under the Effect of Radiation and Magnetohydrodynamics
...Show More Authors

View Publication
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Applied Mathematical Modelling
Potential flow of fluid from an elevated, two-dimensional source
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Sun Jan 02 2011
Journal Name
Education College Journal/al-mustansiriyah
Double Stage Shrinkage Estimators of Two Parameters Generalized Rayleigh Distribution
...Show More Authors

Publication Date
Sat Nov 12 2016
Journal Name
International Journal Of Mechanical Engineering And Technology (ijmet)
PERFORMANCE OF TWO-WAY NESTING TECHNIQUES FOR SHALLOW WATER MODELS
...Show More Authors

A new two-way nesting technique is presented for a multiple nested-grid ocean modelling system. The new technique uses explicit center finite difference and leapfrog schemes to exchange information between the different subcomponents of the nested-grid system. The performance of the different nesting techniques is compared, using two independent nested-grid modelling systems. In this paper, a new nesting algorithm is described and some preliminary results are demonstrated. The validity of the nesting method is shown in some problems for the depth averaged of 2D linear shallow water equation.

Publication Date
Wed Jul 30 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Ions release from fixed orthodontic appliance in two different mouthwashes
...Show More Authors

Background: Metal ions can be released from metallic orthodontic appliances due to corrosion in the oral cavity; prophylactic mouthwashes may have an effect on ion release from orthodontic wires. Materials and Methods: Thirty six orthodontic sets of half maxillary fixed appliance with 2 types of arch wires SS and NiTi(Morelli) were constructed and immersed in 2 types of mouthwashes; Claradone (non-fluoridated) and Silver Care (fluoridated) for 28 days at 37°C, then the released Ni and Cr ionswere measured using atomic absorption spectrophotometer and compared statistically. Results: Ni ion release was higher from NiTi wire group than SS wire group for both mouthwashes and also was higher for Silver Care group than for Claradone group.

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
Solving Two-Points Singular Boundary Value Problem Using Hermite Interpolation
...Show More Authors

In this paper, we have been used the Hermite interpolation method to solve second order regular boundary value problems for singular ordinary differential equations. The suggest method applied after divided the domain into many subdomains then used Hermite interpolation on each subdomain, the solution of the equation is equal to summation of the solution in each subdomain. Finally, we gave many examples to illustrate the suggested method and its efficiency.

View Publication Preview PDF
Crossref