Preferred Language
Articles
/
jcois-2220
Borrowing in a diwan Moon Tree for Nazik Angels
...Show More Authors

The moon tree, the lover of the night, cholera, the sea changes its colors are poetic products left by the pioneer of free poetry, as many have called her. She used to write poetry and publish it in magazines and newspapers until she published it with collections that came into existence from an early age. Several factors helped her in that that contributed to the formation of her personality and the maturity of her talent, including factors Family, including environmental, and psychological, until she later became the focus of attention of many, so she became taught in the universities of London, and students stood by her method of writing free poetry, this poetic color that Badr Shaker Al-Sayyab participated in pioneering. Whoever examines the life of this poet and her achievements finds that every part of her life evaluates research and letters, and every house she has has a lot of ambiguity and creativity, which makes you stand there a lot to meditate on it and dive into its meanings and try to extract the rhetorical arts from it and wonder how a poet at an early age had this ability to choose words. Eloquent to this extent, and how can you weave it, but you go back and say talent and the poet's family are the two main poles in its formation, in addition to its culture and study, which enabled it to impart Arab landmarks colored by the Western character and renewal. And al-Sayyab explained by saying: (The two poets - meaning Nazek and al-Sayyab - tried to renew the content of Arabic poetry and followed the general form of the poem on the path of immigrant literature and American literature in particular. Badr was deeply impressed by English and American literature, and he admired the American poet TS Eliot. .......... As for Nazik, she is authentic in her Arab culture and in her understanding of Arabic literature. It was clear, and it followed a well-marked path (( ), as for its pioneering of free poetry, it had another opinion, it was mentioned that this poetry has roots dating back to the year 1911 AD, in what was published in magazines and newspapers, and that Nazik and Al-Siyab re-try and renew () although they are in many Interviews It was confirmed that she is the pioneer of free poetry, from that an interview that Dr. Mahmoud Muhammad al-Habib conducted with her and was published in the Journal of Arts when he asked her by saying: (There was a lot of controversy about the first poem that was composed in free poetry. It was said that the late Badr Shakir al-Sayyab preceded you in that in his poem “Was it Love” in his collection “Withered Flowers” (1947), while you insist that you preceded him chronologically in your poem “Cholera” which was published by Al-Oruba magazine on 1/12/1947.. .......... - She replied - ....... The important thing is that my poem was published before his poem, and I did not have any knowledge of Badr Shakir al-Sayyab - may God have mercy on him - at that time, so he did not look at my poem when he composed his poem Nor did I read his poem when I compiled mine, but each of us started separately. The two poems (Cholera) and (Was it Love) differ from one another in weight, theme, form, and language...) () We note from her answer that she insists and is proud that she is the pioneer of poetry Al-Hur, with her poem Cholera, was agreed by many.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Iraqi stock market structure analysis based on minimum spanning tree
...Show More Authors

tock markets changed up and down during time. Some companies’ affect others due to dependency on each other . In this work, the network model of the stock market is discribed as a complete weighted graph. This paper aims to investigate the Iraqi stock markets using graph theory tools. The vertices of this graph correspond to the Iraqi markets companies, and the weights of the edges are set ulrametric distance of minimum spanning tree.

View Publication
Scopus Crossref
Publication Date
Wed Oct 07 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Phylogenetic Tree Analysis of First Psychrobacter Sp. Strain From Blood of Iraqi Patient; A Case Report
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Morphological study of bronchial tree and lung in Iraqi weasel (Herpestes javanicus)
...Show More Authors
Abstract<p>The current study aimed to identify the morphological description and branches of the bronchial tree and lung for the weasel <italic>Herpestes javanicus</italic> as one of the Iraqi mammals inhabiting the Iraqi environment. In the current study, 10 samples with an mean weight of 288-564 g were used, trachea and lung were removed from the samples and confirmed using proven solutions and laboratory tests were conducted on 5 samples of the study to identify the branches of the bronchial tree using the technique of casting resin and then exposing the samples to erosion. Weasel has a pair of bright pink sponge lungs that occupy most of the thoracic cavity. The lungs look similar </p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Nov 17 2022
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
Minimum spanning tree application in Covid-19 network structure analysis in the countries of the Middle East
...Show More Authors

Coronavirus disease (Covid-19) has threatened human life, so it has become necessary to study this disease from many aspects. This study aims to identify the nature of the effect of interdependence between these countries and the impact of each other on each other by designating these countries as heads for the proposed graph and measuring the distance between them using the ultrametric spanning tree. In this paper, a network of countries in the Middle East is described using the tools of graph theory.

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Thu Aug 01 2024
Journal Name
Iop Conference Series: Earth And Environmental Science
Combining Bourgoyne and Young Equations by Bagging Tree Regression to Predict Rate of Penetration in a Southern Iraqi Field, Case Study
...Show More Authors
Abstract<p>Achieving an accurate and optimal rate of penetration (ROP) is critical for a cost-effective and safe drilling operation. While different techniques have been used to achieve this goal, each approach has limitations, prompting researchers to seek solutions. This study’s objective is to conduct the strategy of combining the Bourgoyne and Young (BYM) ROP equations with Bagging Tree regression in a southern Iraqi field. Although BYM equations are commonly used and widespread to estimate drilling rates, they need more specific drilling parameters to capture different ROP complexities. The Bagging Tree algorithm, a random forest variant, addresses these limitations by blending domain kno</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Wed Oct 07 2020
Journal Name
Indian Journal Of Forensic Medicine &amp; Toxicology
Bacillus cereus in Meat Products: 16S rRNA Phylogenetic Tree analysis and Antimicrobial Investigation of Nisin A, Rosemary Essential Oil and Tetracycline
...Show More Authors

View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 16 2018
Journal Name
Design And Manufacture An Automatic Knife For Date Palm Tree Frond Cutting Operates By Frequency Theory Cutting‏ Mra Abdulrazak A. Jasim‏
Design and manufacture an automatic knife for date palm tree frond cutting Operates by frequency theory Cutting‏
...Show More Authors

Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (14)
Crossref (5)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF