Preferred Language
Articles
/
jcois-410
Views of Amadi and Gorgani In the metaphor in their books budget and mediation
...Show More Authors

The research revolves around the views of Al-Amadi and Al-Jurjani in the metaphors in their books, balancing Abu Tammam and Al-Bohtari, and mediation between Mutanabi and his opponents. And others whose poems were cited. One of the most important things we have reached is: the critics release the term metaphor to take sometimes and mean to take the meaning or steal it, and analyzed the evidence of metaphor as a rhetorical art in the light of what he heard about the former Arab poets, rejected the unusual metaphor out of use, and reclaimed the familiar metaphor. The research after submitted to the topics are: the first: Al-Amadi and his budget book, the second: Al-Jurjani and his book of mediation, and the third is divided into three demands: the first: the metaphor and its importance, and the second: evidence of metaphor in the budget and the views of Al-Amadi in it, and the third: evidence of metaphor in the mediation and the views of Jurjani Ha, then our findings.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
Religious Discourse of Biblical Intertextuality in Abraham Regelson Works: Selected Samples from the Collection "House of Brightness": הנאום הדתי של האינטרטקסטואליות התנ''כית ביצירותיו של אברהם רגלסון סיפורים נבחרים מקובץ "בית הניצוץ"
...Show More Authors

This research display a selected sample of Regelson's texts, there were interrelations and interactions unfolded so as to show his creativity in the employment of religious texts. In the story "In the Youth of Moses", he inter-texted the episode of the Prophet Moses from the Torah, the Source of legislation, to signify a legislative issue needed by the community. As for the story of "Samson, One of the Falling", he originated the character of The Judge Samson by alluding to the Book of the Judges, which is the Book which reminded of the defeat and slavery of the Palestinians by a Jewish leader, as is related in Jewish religious texts. Further, and the story of "And Haman Said", he chose the story of the Queen Esther from the Book of Esth

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 13 2011
Journal Name
Iraqi Journal Of Laser
Evaluation of Low Level Laser Therapy Using Diode Laser in Enhancement of Episiotomy Wound Healing
...Show More Authors

we studied the effect of low level laser therapy (LLLT) using diode laser with wavelength of (790-805) nm in promotion and enhancement of wound healing of episiotomy and to evaluate the analgesic effect of LLLT in reducing the pain sensation caused by the episiotomy wounds. Nineteen women with episiotomy wound were selected and divided into three groups; 1st group (group No.1: control group) given antibiotics without laser therapy, in the 2nd group (group No.2) the wounds were exposed to laser therapy (4 sessions, each session with energy density of 19.90 J /cm2 every other day ) and systemic antibiotics were prescribed for 1 week. In the 3rd group (group No.3) the wounds were exposed to laser therapy (4 sessions, the same as in the 2nd

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 02 2023
Journal Name
Pakistan Heart Jornal
The Effect of the Strategy of Differentiated Education According to the Auditory Learning Style by Using Assistance in Learning the Back Kick (T-Chagi) for the Young Players of …
...Show More Authors

Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
An Investigation of Corona Domination Number for Some Special Graphs and Jahangir Graph
...Show More Authors

In this work,  the study of corona domination in graphs is carried over which was initially proposed by G. Mahadevan et al. Let be a simple graph. A dominating set S of a graph is said to be a corona-dominating set if every vertex in is either a pendant vertex or a support vertex. The minimum cardinality among all corona-dominating sets is called the corona-domination number and is denoted by (i.e) . In this work, the exact value of the corona domination number for some specific types of graphs are given. Also, some results on the corona domination number for some classes of graphs are obtained and the method used in this paper is a well-known number theory concept with some modification this method can also be applied to obt

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Performance Evaluation of Intrusion Detection System using Selected Features and Machine Learning Classifiers
...Show More Authors

Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems.  Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic.  Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance.  In this study, two different sets of select

... Show More
View Publication Preview PDF
Scopus (29)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Collection, Storage and Protein Extraction Method of Gingival Crevicular Fluid for Proteomic Analysis
...Show More Authors

Gingival crevicular fluid (GCF) may reflect the events associated with orthodontic tooth movement. Attempts have been conducted to identify biomarkers reflecting optimum orthodontic force, unwanted sequallea (i.e. root resorption) and accelerated tooth movement. The aim of the present study is to find out a standardized GCF collection, storage and total protein extraction method from apparently healthy gingival sites with orthodontics that is compatible with further high-throughput proteomics. Eighteen patients who required extractions of both maxillary first premolars were recruited in this study. These teeth were randomly assigned to either heavy (225g) or light force (25g), and their site specific GCF was collected at baseline and aft

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Engineering And Applied Sciences
The role of e-Government on corruption and its impact on the financial performance of the government: An empirical analysis on the Iraqi government
...Show More Authors

This study aimed to provide a conceptual model for the use and benefits of the e-Government as related to administrative fraud and financial corruption. The study also looked into their concepts, forms, dimensions and types and the role of e-Government on fraud reduction, corruption in administration and finance and its impact on the government performance. From the result, it is revealed that there is need for electronic government for implementation in order to curb the rate of fraud and administrative and financial corruption and improve the quality of service provision for better performance

Scopus (16)
Scopus
Publication Date
Mon Oct 07 2024
Journal Name
F1000research
Oral pre-treatment with Citronellol ameliorates Methotrexate-induced nephrotoxicity in Wistar rats via targeting oxidative stress and inflammation
...Show More Authors

Background Methotrexate (MTX) is a classical folic acid antagonist widely used in the treatment of malignant and non-malignant disorders. However, its clinical application is often restricted by concomitant adverse effects, including renal damage. Numerous studies have highlighted the role of oxidative stress and inflammation in mediating MTX-related nephrotoxicity. Therefore, the current study aimed to explore the possible renoprotective action of Citronellol (CT), a natural compound with prominent antioxidant and anti-inflammatory activities, against nephrotoxicity induced by MTX. Methods To fulfill our objective, 24 adult male Wistar rats were randomly allocated into four groups: control, MTX, 100 mg/kg CT plus MTX and 200 mg/kg C

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sat Sep 01 2018
Journal Name
J Of Baghdad College Of Dentistry
Serum Tumor Necrosis Factor Alpha and High Sensitive C-Reactiveprotein as Biomarkersin Periodontitis in Iraqi Patients with Osteoarthritis
...Show More Authors