Preferred Language
Articles
/
jcois-2242
Metaphor in the interpretation of the long sea of Ibn Ajiba
...Show More Authors

Scientists have delved too much into reality and metaphor, and perhaps a topic of Arabic rhetoric has not received the attention and care of scholars as much as the topic of truth and metaphor. The metaphor opens wide horizons of expression in front of the writer so that he has several means by which he can express the one experience, so his imagination takes off depicting the intelligible as tangible, the seen as audible, and the audible as seen. That image presented by the creative writer.
The first thing to note is that the emergence of metaphor as a rhetorical term was at the hands of the Mu'tazila. Muslims differed about the issue of metaphor in the Holy Qur’an, and the beginning of the dispute was about the verses in which the metaphorical image was mentioned that imagined the similarity between God Almighty and His creatures, so some of them carried it on its surface, as some of the phenomenon, and some of the Sunnis, and its enemy in the matter of truth, and some of them diverted it from its face The first of them is from its appearance as the Mu'tazila, for the Mu'tazila relied on metaphor in defining their principles and opinions, debating their opponents, and responding to those who challenged the Qur'an.

View Publication
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
المحددات الاقتصادية والاجتماعية للبطالة في السودان -دراسة قياسية باستخدام انحدار المركبات الرئيسة للمدة (1981-2015م)
...Show More Authors

Considering the magnitude of its economic, social and political impact, unemployment represents a crucial challenge confronting the majority of the countries of the world. The problem of the study was the high rates of unemployment in Sudan and the inability of economic growth rates to keep pace with the steady increases in unemployment rates during the study period. This study aimed to identify the economic and social variables influencing unemployment rate in Sudan, in addition to measuring the impact of these variables over the period (1981-2015). Data were collected from databases of the World Bank and Atlas of the World's data .The study hypothesized the presence of statistically significant and direct relationship between u

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Apr 15 2024
Journal Name
Nibal
يعتبر الاتصال وسيلة هادفة من الوسائل الرئيسية التي تستخدمها المنظمة الإدارية في تحقيق أهدافها إذ أن جميع العاملين يتعاملون مع بعضهم البعض من خلال وسائل الاتصال المختلفة من أجل ضمان تسيير نشاطاتهم وتحقيق أهدافهم وهذا يدل على أن الاتصال يعتبر الوسيلة الاجتماعية التي يحقق الأفراد من خلالها سبل التفاهم والتفاعل البناء
...Show More Authors

Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
مقارنة مقدرات بيز لدالة المعولية لتوزيع باريتو من النوع الاول باستعمال دوال معلوماتية مضاعفة مختلفة
...Show More Authors

The comparison of double informative priors which are assumed for the reliability function of Pareto type I distribution. To estimate the reliability function of Pareto type I distribution by using Bayes estimation, will be  used two different kind of information in the Bayes estimation; two different priors have been selected for the parameter of Pareto  type I distribution . Assuming distribution of three double prior’s chi- gamma squared distribution, gamma - erlang distribution, and erlang- exponential distribution as double priors. The results of the derivaties of these estimators under the squared error loss function with two different double priors. Using the simulation technique, to compare the performance for

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 03 2013
Journal Name
Baghdad Science Journal
Couniform Modules
...Show More Authors

In this paper, we introduce and study a new concept named couniform modules, which is a dual notion of uniform modules, where an R-module M is said to be couniform if every proper submodule N of M is either zero or there exists a proper submodule N1 of N such that is small submodule of Also many relationships are given between this class of modules and other related classes of modules. Finally, we consider the hereditary property between R-module M and R-module R in case M is couniform.

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Synthesis AgO Nanoparticles by Nd:Yag Laser with Different Pulse Energies
...Show More Authors

     One technique used to prepare nanoparticles material is Pulsed Laser Ablation in Liquid (PLAL), Silver Oxide nanoparticles (AgO) were prepared by using  this technique, where silver target was submerged in ultra-pure water (UPW)  at room temperature after that Nd:Yag laser which characteristics by 1064 nm wavelength, Q-switched, and 6ns pulse duration was used to irradiated silver target. This preparation method was used to study the effects of laser irradiation on Nanoparticles synthesized by used varying laser pulse energy 1000 mJ, 500 mJ, and 100 mJ, with 500 pulses each time on the particle size. Nanoparticles are characterized using XRD, SEM, AFM, and UV-Visible spectroscopy. All the structural peaks determined by the XRD

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
الادارة بالرؤية المشتركة وانعكاساتها على التسويق الابداعي بحث استطلاعي لعينة من موظفي الشركة العامة للصناعات الكهربائية
...Show More Authors

ان السبب الرئيسي لاختيار الموضوع كونه من الاساليب الادارية الحديثة التي تهدف الى انجاح المنظمة او الشركة المبحوثة, اذ تمثلت مشكلة البحث في ما دور الادارة بالرؤية المشتركة في تعزيز التسويق الابداعي بالشركة المبحوثة, يهدف البحث الى تسليط الضوء على مفهوم الادارة بالرؤية المشتركة وانعكاساتها على التسويق الابداعي للمنظمة ، باعتبارها منهج اداري حديث يسهم في تغيير وتجديد وتطوير واقع المنظمة المبحوثة( الشرك

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
فلسفة دراسة أدارة الموارد البشرية بمنظور استراتيجي*
...Show More Authors

with intellectual and philosophical in modern administrative thought. The focus of the target on the identification of the strategic concept of human resource management practices in business organizations. It studied the scientific concept, in terms of how it has been the shift from  personnel management, and to human resources management, and then to HR management strategy. The research has included extensive serious discussions about the nature of the changes, and how to determine the nature and content of the strategic perspective of human resources management in the changing and volatile world of business. It was also the explanation and clarification theoretical philosophies that came in various previous studies, and i

... Show More
View Publication Preview PDF
Crossref