The moon tree, the lover of the night, cholera, the sea changes its colors are poetic products left by the pioneer of free poetry, as many have called her. She used to write poetry and publish it in magazines and newspapers until she published it with collections that came into existence from an early age. Several factors helped her in that that contributed to the formation of her personality and the maturity of her talent, including factors Family, including environmental, and psychological, until she later became the focus of attention of many, so she became taught in the universities of London, and students stood by her method of writing free poetry, this poetic color that Badr Shaker Al-Sayyab participated in pioneering. Whoever examines the life of this poet and her achievements finds that every part of her life evaluates research and letters, and every house she has has a lot of ambiguity and creativity, which makes you stand there a lot to meditate on it and dive into its meanings and try to extract the rhetorical arts from it and wonder how a poet at an early age had this ability to choose words. Eloquent to this extent, and how can you weave it, but you go back and say talent and the poet's family are the two main poles in its formation, in addition to its culture and study, which enabled it to impart Arab landmarks colored by the Western character and renewal. And al-Sayyab explained by saying: (The two poets - meaning Nazek and al-Sayyab - tried to renew the content of Arabic poetry and followed the general form of the poem on the path of immigrant literature and American literature in particular. Badr was deeply impressed by English and American literature, and he admired the American poet TS Eliot. .......... As for Nazik, she is authentic in her Arab culture and in her understanding of Arabic literature. It was clear, and it followed a well-marked path (( ), as for its pioneering of free poetry, it had another opinion, it was mentioned that this poetry has roots dating back to the year 1911 AD, in what was published in magazines and newspapers, and that Nazik and Al-Siyab re-try and renew () although they are in many Interviews It was confirmed that she is the pioneer of free poetry, from that an interview that Dr. Mahmoud Muhammad al-Habib conducted with her and was published in the Journal of Arts when he asked her by saying: (There was a lot of controversy about the first poem that was composed in free poetry. It was said that the late Badr Shakir al-Sayyab preceded you in that in his poem “Was it Love” in his collection “Withered Flowers” (1947), while you insist that you preceded him chronologically in your poem “Cholera” which was published by Al-Oruba magazine on 1/12/1947.. .......... - She replied - ....... The important thing is that my poem was published before his poem, and I did not have any knowledge of Badr Shakir al-Sayyab - may God have mercy on him - at that time, so he did not look at my poem when he composed his poem Nor did I read his poem when I compiled mine, but each of us started separately. The two poems (Cholera) and (Was it Love) differ from one another in weight, theme, form, and language...) () We note from her answer that she insists and is proud that she is the pioneer of poetry Al-Hur, with her poem Cholera, was agreed by many.
The bandwidth requirements of telecommunication network users increased rapidly during the last decades. Optical access technologies must provide the bandwidth demand for each user. The passive optical access networks (PONs) support a maximum data rate of 100 Gbps by using the Orthogonal Frequency Division Multiplexing (OFDM) technique in the optical access network. In this paper, the optical broadband access networks with many techniques from Time Division Multiplexing Passive Optical Networks (TDM PON) to Orthogonal Frequency Division Multiplex Passive Optical Networks (OFDM PON) are presented. The architectures, advantages, disadvantages, and main parameters of these optical access networks are discussed and reported which have many ad
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThis paper contains an equivalent statements of a pre- space, where are considered subsets of with the product topology. An equivalence relation between the preclosed set and a pre- space, and a relation between a pre- space and the preclosed set with some conditions on a function are found. In addition, we have proved that the graph of is preclosed in if is a pre- space, where the equivalence relation on is open.
On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreAbstract The avulsion of the flexor digitorum profundus, also known as the jersey finger, is a well-known injury that can be treated surgically. It has been classified into four types, among them type IV which involves tendon avulsion from an associated bony fragment with subsequent retraction to the palm or proximal interphalangeal joint is very rare. We present a case of type IV injury in a 45-year-old man with a pulling-on injury. The repair followed a pull-out technique (reinserting the tendon into the avulsed fragment); the entire reduction was tied over a button on the dorsal aspect of the nail and was augmented with a volar plate. The case was reported due to its rarity. We found that early surgical management of this problem greatly
... Show MoreAn increasing interest is emerging in identifying natural products to overcome drug resistance in cancer patients. In this context, the present study was conducted to investigate the cytotoxic effects of neem plant (Azadirachta indica) oil in three different biological models (breast cancer cell lines, Allium cepa root tip, and mice vital organs). The cytotoxic potential of the neem oil was evaluated with two human cell lines (MCF7 and MDA-MB231) and an Allum cepa root tip bioassay. Histopathological analysis was conducted on the neem oil-treated and untreated control mice. The results revealed an anti-proliferative effect for neem oil on both estrogen receptor-positive (MCF7) and estrogen receptor-negative (MDA-MB231) breast cancer cell li
... Show More