This study is marked by: The ignorant poem and body language
Its main objective is to reveal the manifestations of this language in the text mentioned, and accordingly, the sieve poem has been read semantic (semantic) and hermeneutic, revealing the poet's ability to employ symbols and signals (body language) in the poem chosen for this purpose; The existence of such language in pre-Islamic poetry. After a long reflection and reading, the signs and symbols of the physical movement of the body, and its feminine and aesthetic manifestations were identified, and this was achieved through the use of modern critical methodologies that directly affect this language. The study consisted of an introduction and three topics, followed by the conclusion of the most important results, and then a list of sources and references.
The most important results were as follows:
• This poem, and the like, is a non-rejection of contemporary theories of criticism, and this is proved by this study, the text ignorant text is committed to the technical and aesthetic standards required by human texts.
• In the poem there is a clear synergy between non-linguistic and linguistic signs, such as facial expressions, hand movements, head, tones, exhales, and dress. These ensuing bodily movements produced a series of symbols and connotations.
Reading the body language in the poem was based on some functional analysis of the members. Finally, the study recommends the need to intensify modern monetary efforts directed towards the ignorant text, because it is a text carrying a flood of signals that contribute to the reproduction of this text
The research problem consisted in answering the question that revolves around what is the impact of localizing employees’ salaries on bank deposits, and did it lead to an increase in their size? The research also aimed to nominate some initial solutions to improve the role of salary localization, in terms of reviewing the concept of electronic payment systems, its tools and channels, and then identifying the concept of salary localization, its importance, objectives and obstacles to its application, and then analyzing the reality of the state of localization of salaries and bank deposits to banks, the research sample for the period (2017- 2021), and the use of the statistical program (SPSS V25) to test the research hypotheses. The stud
... Show MoreThe researchers reached many conclusions, the most important of which was the distinction of practitioners of sports activity with high degrees in the trait (social). At the same time, it was low in the trait (aggression –restraint-desisting) and non-practitioners were distinguished by sports activity with high degrees in the trait (aggression –restraint-desisting). In contrast, the degree was low in the trait (social), and there were significant differences in favor of practitioners of the activity of the athlete, Through the conclusions, the researchers recommend the need for university students to practice sports activities because of their positive impact on their health in general and on the deve
... Show MoreVaccine hesitancy poses a significant risk to global recovery from COVID-19. To date however, there is little research exploring the psychological factors associated with vaccine acceptability and hesitancy in Iraq.
To explore attitudes towards COVID-19 vaccination in Iraq. To establish the predictors of vaccine uptake and vaccine hesitancy in an Iraqi population.
Using a cross-sectional design, 7,778 participants completed an online questionnaire exploring their vaccination status, likelihood of infection, perc
The purpose of this study is to investigate the research on artificial intelligence algorithms in football, specifically in relation to player performance prediction and injury prevention. To accomplish this goal, scholarly resources including Google Scholar, ResearchGate, Springer, and Scopus were used to provide a systematic examination of research done during the last ten years (2015–2025). Through a systematic procedure that included data collection, study selection based on predetermined criteria, categorisation based on AI applications in football, and assessment of major research problems, trends, and prospects, almost fifty papers were found and analysed. Summarising AI applications in football for performance and injury p
... Show MoreThe current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on
... Show MoreSubstantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More