Preferred Language
Articles
/
jcois-2242
Metaphor in the interpretation of the long sea of Ibn Ajiba
...Show More Authors

Scientists have delved too much into reality and metaphor, and perhaps a topic of Arabic rhetoric has not received the attention and care of scholars as much as the topic of truth and metaphor. The metaphor opens wide horizons of expression in front of the writer so that he has several means by which he can express the one experience, so his imagination takes off depicting the intelligible as tangible, the seen as audible, and the audible as seen. That image presented by the creative writer.
The first thing to note is that the emergence of metaphor as a rhetorical term was at the hands of the Mu'tazila. Muslims differed about the issue of metaphor in the Holy Qur’an, and the beginning of the dispute was about the verses in which the metaphorical image was mentioned that imagined the similarity between God Almighty and His creatures, so some of them carried it on its surface, as some of the phenomenon, and some of the Sunnis, and its enemy in the matter of truth, and some of them diverted it from its face The first of them is from its appearance as the Mu'tazila, for the Mu'tazila relied on metaphor in defining their principles and opinions, debating their opponents, and responding to those who challenged the Qur'an.

View Publication
Publication Date
Fri Jan 01 2016
Journal Name
Bulletin Of Mathematics And Statistics Research
New Approximation Operators Using Mixed Degree Systems
...Show More Authors

This paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
Abuse elder and relationship life review
...Show More Authors

The study aimed at identifying the domains of abuse of the elderly (each field separately) of the research sample. The study sample consisted of (100) senior citizens residing in nursing homes in Baghdad and Kirkuk cities. They were selected in a simple random way. In order to achieve the research objectives, two scales were developed to measure the abuse of the elderly consisted of six domains: Neglection abuse, emotional abuse, physical abuse, social abuse, financial abuse, sexual abuse), and the other to measure the life review. The results showed that the level of abuse of older people in the sample is higher than the average in the society they belong to, the level of life review was higher than the average they belong to, and the a

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Financial investment strategies – Conceptual Framework
...Show More Authors

The investor needs to a clear strategy for the purpose of access to the financial market, that is, has a plan to increase The share of the profits thinking entrepreneur and new, and highlights the importance of this in that it sets for the investor when it goes to the market, and when it comes out of it, and at what price to buy or sell the stock, and what is the the amount of money it starts. Fortunately, he does not need to invent his own investment strategy, because over the years the development of effective methods of buying and selling, and once you understand how to work these methods investor can choose the most appropriate methods and adapted image that fit his style investment .

  &nb

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
المحددات الاقتصادية والاجتماعية للبطالة في السودان -دراسة قياسية باستخدام انحدار المركبات الرئيسة للمدة (1981-2015م)
...Show More Authors

Considering the magnitude of its economic, social and political impact, unemployment represents a crucial challenge confronting the majority of the countries of the world. The problem of the study was the high rates of unemployment in Sudan and the inability of economic growth rates to keep pace with the steady increases in unemployment rates during the study period. This study aimed to identify the economic and social variables influencing unemployment rate in Sudan, in addition to measuring the impact of these variables over the period (1981-2015). Data were collected from databases of the World Bank and Atlas of the World's data .The study hypothesized the presence of statistically significant and direct relationship between u

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 15 2024
Journal Name
Nibal
يعتبر الاتصال وسيلة هادفة من الوسائل الرئيسية التي تستخدمها المنظمة الإدارية في تحقيق أهدافها إذ أن جميع العاملين يتعاملون مع بعضهم البعض من خلال وسائل الاتصال المختلفة من أجل ضمان تسيير نشاطاتهم وتحقيق أهدافهم وهذا يدل على أن الاتصال يعتبر الوسيلة الاجتماعية التي يحقق الأفراد من خلالها سبل التفاهم والتفاعل البناء
...Show More Authors

Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
مقارنة مقدرات بيز لدالة المعولية لتوزيع باريتو من النوع الاول باستعمال دوال معلوماتية مضاعفة مختلفة
...Show More Authors

The comparison of double informative priors which are assumed for the reliability function of Pareto type I distribution. To estimate the reliability function of Pareto type I distribution by using Bayes estimation, will be  used two different kind of information in the Bayes estimation; two different priors have been selected for the parameter of Pareto  type I distribution . Assuming distribution of three double prior’s chi- gamma squared distribution, gamma - erlang distribution, and erlang- exponential distribution as double priors. The results of the derivaties of these estimators under the squared error loss function with two different double priors. Using the simulation technique, to compare the performance for

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 03 2013
Journal Name
Baghdad Science Journal
Couniform Modules
...Show More Authors

In this paper, we introduce and study a new concept named couniform modules, which is a dual notion of uniform modules, where an R-module M is said to be couniform if every proper submodule N of M is either zero or there exists a proper submodule N1 of N such that is small submodule of Also many relationships are given between this class of modules and other related classes of modules. Finally, we consider the hereditary property between R-module M and R-module R in case M is couniform.

View Publication Preview PDF
Crossref (3)
Crossref