Andalusian literature is a literature in itself that is influenced and influenced, and it did not come out of thin air. Muslim Arabs came from the East to this country for jihad and a desire to live, and they carried with them their beliefs, customs and traditions. They must blend in the new element and its environment, so interference, fusion, diversity and influence actually took place.
It seems to us that the Arabs in the era of the governors in Andalusia (92-138 AH) strived hard to preserve everything that is Eastern. Literature is an oriental model in the content of prose and poetry, but in the era of the Umayyad emirate, we will notice that the environment, the development of ages, and the mixing of civilizations have an effect on a new emergence of poetry and prose in terms of ideas and topics. Poetry was the most responsive field, employment and speed. His verses are a model for presenting topics and creating images and meanings in a way that simulates the Andalusian environment.
The research aims to deal with the life of the poet the father, analyzing his verses, clarifying the new topics that he introduced, and then analyzing the life of the poetess daughter and revealing the face of the poetic relationship and her father. The induction concluded that there is a close relationship between the two poets in the purpose and rhyme of poetry.
In view of the scarcity of the sources that have been translated for them and their scarcity, the research recommended that extensive studies be prepared on the subject of the research and to return to manuscripts that have not yet been verified.
Sensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte
... Show MoreCapparis spinosa is one of the oldest genera grown in Iraqi land with worldwide traditional medicinal uses beside the culinary uses. These uses were own to the presence of many phytochemical including flavonoids, polyphenols. Among the reported polyphenolic acids are caffeic, chlorogenic and ferulic acids with well-known powerful antioxidant properties. The present work aimed to identify the presence of these polyphenolic acids in Iraqi caper naturally gown in the rural area of middle Iraq following standard chromatographic procedures. Aerial parts of the plant (buds, berries and leaves) were extracted with hydroalcoholic solvent by maceration method. Thin layer chromatographic techniques and HPLC analysis were performed to iden
... Show MoreWith the aim of developing potential antimicrobials, a series of novel Ciprofloxacin methylene isatin derivatives incorporating different aromatic aldehydes were synthesized and characterized by FTIR, 1H NMR, Mass spectroscopy and bases of elemental analysis. In addition, the in vitro antibacterial and antifungal properties were tested against some human pathogenic microorganisms by employing the disc diffusion technique. A majority of compounds were showing activity against several of the microorganisms. The relationship between the functional group variation and the biological activity of the evaluated compounds is discussed. From comparisons of the compounds, 3c was determined to be the most active compound.
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreABSTRACT Background: Diabetes and periodontitis are complicated prolonged disorders through a recognized two-way association. There is elongated-conventional mark that hyperglycaemia in diabetes is affected on immune-inflammatory response and disturb the action of osteoclast and in balance bone turnover, which might rise the person vulnerability to the progress of prolonged periodontitis. Osteocalcin is one of the greatest plentiful matrix proteins originate in bones and produced absolutely there. Small osteocalcin crumbles are noticed in regions of bone remodeling and are in fact degradation products of the bone matrix, that is released outside cells into the Gingival Crevicular Fluid (GCF) and saliva after destruction of periodontal tissu
... Show More