Preferred Language
Articles
/
jcois-2070
SUBSTITUTION SEMANTICS (METAPHOR) AND SEMANTICS ADJOINING (METONYMY
...Show More Authors

Abstract

Praise be to God, Lord of the Worlds, and prayers and peace be upon the most honorable of creation, Muhammad, whom God sent as a mercy to the worlds, and his infallible, pure, and pure family, and his faithful companions

I did not find anyone who studied stylistic structures except for one study, which is (The Literature of Imam Al-Jawad (peace be upon him), a stylistic study by the student Mina Reda Kazem, a master’s thesis), and it did not address the Hadi and the military men (peace be upon them) as the text of those texts. Coherently complementing each other.

I decided to stand by this heritage as a single text in a uniform period of time approximately from the year 195-260 AH, some of which take the necks of some of the breasts of the father, the son and the grandson, and to stand at the characteristics of it, and their scattering was the beauty of those things. Beautiful speech spread in a style governed by rhythmic melody, selected language, clear idea and sound logic..

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 20 2017
Journal Name
Proceedings Of The 5th International Conference On Communications And Broadband Networking
Bit precision and Cyclic prefix effect on OFDM Power Consumption Estimation
...Show More Authors

View Publication
Crossref (2)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Recycling of Chicken Egg Shells into Nanopowder: Synthesis, and its Properties
...Show More Authors

Increase in unconventional resources of calcium (Ca+2) for fowls, aquaculture and native animals was improved. This work was planned to define the most polymorph of calcium carbonate (CaCO3) that take place in the two types of chicken eggshells (local and imported type). In this research, the comparative analysis of calcium carbonate (CaCO3) content was approved for nominated eggshells of native strain and imported chicken via Field Emission Scanning Electron Microscope (FESEM), Transmission Electron Microscope (TEM), Fourier-Transform Infrared Spectroscopy (FTIR) and Powder X-Ray Diffraction (PXRD) analysis. The results demonstrate that native and imported chicken eggshells comprise calcite morph that ha

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Current Neuropharmacology
Ischemic Stroke and Autophagy: The Roles of Long Non-Coding RNAs
...Show More Authors
:

Ischemic stroke is a significant cause of morbidity and mortality worldwide. Autophagy, a process of intracellular degradation, has been shown to play a crucial role in the pathogenesis of ischemic stroke. Long non-coding RNAs (lncRNAs) have emerged as essential regulators of autophagy in various diseases, including ischemic stroke. Recent studies have identified several lncRNAs that modulate autophagy in ischemic stroke, including MALAT1, MIAT, SNHG12, H19, AC136007. 2, C2dat2, MEG3, KCNQ1OT1, SNHG3, and RMRP. These lncRNAs regulate autophagy by interacting with key proteins involved in the autophagic process, such as Beclin-1, ATG7, and LC3. Understanding the role of lncRNAs in regulating auto

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (22)
Crossref (10)
Scopus Crossref
Publication Date
Wed Jun 24 2015
Journal Name
Chinese Journal Of Biomedical Engineering
Single Channel Fetal ECG Detection Using LMS and RLS Adaptive Filters
...Show More Authors

ECG is an important tool for the primary diagnosis of heart diseases, which shows the electrophysiology of the heart. In our method, a single maternal abdominal ECG signal is taken as an input signal and the maternal P-QRS-T complexes of original signal is averaged and repeated and taken as a reference signal. LMS and RLS adaptive filters algorithms are applied. The results showed that the fetal ECGs have been successfully detected. The accuracy of Daisy database was up to 84% of LMS and 88% of RLS while PhysioNet was up to 98% and 96% for LMS and RLS respectively.

Publication Date
Wed Jun 01 2022
Journal Name
Annals Of The Faculty Of Arts
Motivation and Second Language Acquisition: Motivational Orientations in Foreign Language Learning
...Show More Authors

Numerous research studies have been conducted on why some learners acquire a second language more easily and quickly than others. Most of these studies have demonstrated that acquiring a second language does not depend only on learners’ cognitive ability or professional teaching strategies. The learning language process is more complicated than that. It is affected by crucial factors that are beyond the control of learners and teachers. These factors are known as sociolinguistic factors. These factors include culture, age, motivation, socio-economic status, and gender. This research paper mainly concentrates on the role of motivation in second language acquisition.

View Publication Preview PDF
Publication Date
Sat Jan 01 2005
Journal Name
Al-khwarizmi Engineering Journal
Kinetic and Mechanism of Oxidation of Oxalic Acid by Cerium (IV)
...Show More Authors

Kinetic and mechanism studies of the oxidation of oxalic acid by Cerium sulphate have been carried out in acid medium sulphuric acid. The uv- vis. Spectrophotometric technique was used to follow up the reaction and the selected wavelength to be followed was 320 nm. The kinetic study showed that the order of reaction is first order in Ce(IV) and fractional in oxalic acid. The effect of using different concentration of sulphuric acid on the rate of the reaction has been studied a and it was found that the rate decreased with increasing the acid concentration. Classical organic tests was used to identify the product of the oxidation reaction, the product was just bubbles of CO2.

Publication Date
Thu Jan 25 2024
Journal Name
Iraqi Journal Of Agricultural Sciences
ISOLATION AND IDENTIFICATION OF BIOFILM PRODUCING ENTEROCOCCUS FAECALIS FROM ROOT CANAL
...Show More Authors

This study was aimed to one of the most prevalent causes for endodontic treatment failure is the presence of Enterococcus faecalis bacterium within teeth root canals. To achieve successful treatment, it is so important to study E. faecalis behavior. The aim of study was to investigate biofilm production and antibiotic sensitivity of E. faecalis isolated from root canals. Results showed isolation of E. feacalis (65%) of samples, identified by specific gene by PCR technique. Most isolates were sensitive to Imipenem and resistant to Erythromycin, Clindamycin, Tetracycline and Trimethoprim. Strong biofilm production was detected among 29.5% of highest antibiotic resistant isolates. The results may indicate that infected root canals with E. feac

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Comparison among variable selection models and its application to health dataset
...Show More Authors

View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication