The moon tree, the lover of the night, cholera, the sea changes its colors are poetic products left by the pioneer of free poetry, as many have called her. She used to write poetry and publish it in magazines and newspapers until she published it with collections that came into existence from an early age. Several factors helped her in that that contributed to the formation of her personality and the maturity of her talent, including factors Family, including environmental, and psychological, until she later became the focus of attention of many, so she became taught in the universities of London, and students stood by her method of writing free poetry, this poetic color that Badr Shaker Al-Sayyab participated in pioneering. Whoever examines the life of this poet and her achievements finds that every part of her life evaluates research and letters, and every house she has has a lot of ambiguity and creativity, which makes you stand there a lot to meditate on it and dive into its meanings and try to extract the rhetorical arts from it and wonder how a poet at an early age had this ability to choose words. Eloquent to this extent, and how can you weave it, but you go back and say talent and the poet's family are the two main poles in its formation, in addition to its culture and study, which enabled it to impart Arab landmarks colored by the Western character and renewal. And al-Sayyab explained by saying: (The two poets - meaning Nazek and al-Sayyab - tried to renew the content of Arabic poetry and followed the general form of the poem on the path of immigrant literature and American literature in particular. Badr was deeply impressed by English and American literature, and he admired the American poet TS Eliot. .......... As for Nazik, she is authentic in her Arab culture and in her understanding of Arabic literature. It was clear, and it followed a well-marked path (( ), as for its pioneering of free poetry, it had another opinion, it was mentioned that this poetry has roots dating back to the year 1911 AD, in what was published in magazines and newspapers, and that Nazik and Al-Siyab re-try and renew () although they are in many Interviews It was confirmed that she is the pioneer of free poetry, from that an interview that Dr. Mahmoud Muhammad al-Habib conducted with her and was published in the Journal of Arts when he asked her by saying: (There was a lot of controversy about the first poem that was composed in free poetry. It was said that the late Badr Shakir al-Sayyab preceded you in that in his poem “Was it Love” in his collection “Withered Flowers” (1947), while you insist that you preceded him chronologically in your poem “Cholera” which was published by Al-Oruba magazine on 1/12/1947.. .......... - She replied - ....... The important thing is that my poem was published before his poem, and I did not have any knowledge of Badr Shakir al-Sayyab - may God have mercy on him - at that time, so he did not look at my poem when he composed his poem Nor did I read his poem when I compiled mine, but each of us started separately. The two poems (Cholera) and (Was it Love) differ from one another in weight, theme, form, and language...) () We note from her answer that she insists and is proud that she is the pioneer of poetry Al-Hur, with her poem Cholera, was agreed by many.
Brain Fingerprinting (BF) is one of the modern technologies that rely on artificial intelligence in the field of criminal evidence law. Brain information can be obtained accurately and reliably in criminal procedures without resorting to complex and multiple procedures or questions. It is not embarrassing for a person or even violates his human dignity, as well as gives immediate and accurate results. BF is considered one of the advanced techniques related to neuroscientific evidence that relies heavily on artificial intelligence, through which it is possible to recognize whether the suspect or criminal has information about the crime or not. This is done through Magnetic Resonance Imaging (EEG) of the brain and examining
... Show MoreDrawing upon the recent theoretical framework of Burkean concept of identification (ID), the current study aims at probing the interaction of content and form in two letters penned by Iran’s Supreme Leader and addressed to the Youth on Jan. and Nov. 2015. To this end, the study seeks (i) to determine a role ID takes in the conveyance of intended assumptions to the targeted readers; and (ii) to observe if the writer’s objectives, i.e. to identify himself with the readers and to realize his politically-religiously-infused creeds, result in success or failure; moreover, (iii) it seeks to determine how he achieved his end to attenuate the impacts of blazing inferno of Islamophobia and anti-Islam sentiments in his addressees. The who
... Show MoreA comparison between the resistance capacity of a single pile excited by two opposite rotary machines embedded in dry and saturated sandy soil was considered experimentally. A small-scale physical model was manufactured to accomplish the experimental work in the laboratory. The physical model consists of: two small motors supplied with eccentric mass 0·012 kg and eccentric distance 20 mm representing the two opposite rotary machines, an aluminum shaft with 20 mm in diameter as the pile, and a steel plate with dimensions of (160 × 160 × 20 mm) as a pile cap. The experimental work was achieved taking the following parameters into consideration, pile embedment depth ratio (L/d; length to diameter) and operating freq
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreDouble drum dryer is operated for producing pregelatinized maize starches using feed starch slurries of different
solids(7, 10 and13 g/100 g )content . Steam pressure (2,3,and 4 bar), the level of pool between the drums (4,7,and 10
cm) , and speed of drums rotation (3,4,and 6 rpm) are varied together with the feed solids content in a practical range of
values. The response of the dryer is registered by measuring several output variables, i.e. external drum temperature,
product moisture content, mass flow rate.
The lower Cretaceous sandstones of Zubair and Nahr Umr formations are the main producing reservoirs in Subba oilfield in southern Iraq. Key differences in their petrophysical and depositional attributes exist affecting their reservoir characteristics. The evaluation of well logs and core porosity-permeability data show better reservoir properties in Nahr Formation. The Litho-saturation logs indicate greater thickness of oil-saturated reservoir units for Nahr Unr Formation associated with lower values of shale volume, and higher values of effective porosity. In addition, higher values of permeability for Nahr Umr Formation is suggested by applying porosity-irreducible water saturation cross plot. The reducing reservoir quality of Zub
... Show MoreEmotional blackmail is generally defined as manipulating others' emotions for personal gain. It is a type of manipulation that damages healthy relationships among people and turns them into toxic relations leaving the victim in a state of depression and under stress of losing something s/he holds dear. This study aims to identify the pragmatic techniques of emotional blackmail used by both blackmailers and victims in "No One Would Tell" (2018). To do so, the researchers developed an eclectic model comprising Forward and Frazier's (1997) emotional blackmail, Searle’s speech acts (1979), Brown and Levinson’s politeness strategies (1987), Culpeper’s impoliteness strategies (1996, 2005), and Mayfield's taxonomy of fallacy (2007)
... Show More