This research deals with the topic (the position of women) in the literature literature, and the researcher cites a bouquet of woolen yarn, examples of verses and poems from this fine literature that looks at the woman with respect and appreciation. In their poems.
The research is a comparative search for Arab and Kurdish literature, by selecting six famous poets in the literature, three of them are from Arabic literature, and the other three are from Kurdish literature, and thus the research is divided into two subjects and six demands.
Finally, the researcher tried to set a brick that would be an entry point to find an indicative explanation and a suitable explanation that would break those symbols and signs that caused the expulsion of the ideas of some mystical masters, under the pretext that they contravened the Sharia texts, and to understand the righteous predecessors.
The concept of aesthetics is one of the postmodern propositions, and it is one of the branches of philosophy that examines beauty, its standards and theories, and it is a holistic concept that includes several concepts, including the beautiful, the ugly, and the sublime.
The concept of aesthetics dealt with several studies in general (and in the field of architecture in particular), and the problem of aesthetics is in the blurring of the relationship between aesthetics and architectural criticism, based on the research hypothesis which states that there is a relationship between aesthetics and architectural criticism. The importance of the research in accommodating aesthetic standards and bases of evaluation that increases the possi
Our research which is under the name "Polarization and Communication mechanism in the formation of green industrial products " The problem of the research focuses in identifying what is polarization and its function mechanisms , by displaying the inventive and creative cases of the designer in how to exploit the industrial products and its recycling process to attract the user and recipient by asserting on the values of beauty of the appearance of the industrial product with the attraction Of the user and the recipient with the new function of that product and how its different from the function achieved by the old product , with consideration of nature and its preservation . The results of the research were as following : The designer e
... Show MoreDescribed the Arabic language being of genius sets by top models of eloquence , rhetoric and clarity of sounds and developments Moreover , it is an important element of our existence and our identity and our survival . That my methods and best in teaching Arabic language what has pursued the easiest ways to learning and teaching and helped learners to be aware of the function linguistic information , and they need it and its impact on their lives , and contributed to unleashing the potential of activism and led them to make the effort to apply them in the form of examples and uses of new life , as well as fits are the capabilities and tendencies of different learners , so the goal of current research into the importance of the curriculum
... Show MoreThis research deals with the perceived and the imagined in the texts of Yusef Al-Sayegh, considering language as the most important source in literature and theatrical criticism, and given the importance of the subject, the researcher monitored many philosophical and psychological opinions and theories related to (the perceived and the imagined), and they were discussed and their compatibility with the Iraqi theatrical t As for the second chapter, where (the theoretical framework), it included two topics, and the first topic was about the concept of the perceived and the imagined, and the second topic was about Youssef Al-Sayegh and the structure of the theatrical text.
In the third chapter, where (research procedures), the research
Prison and imprisonment
And their impact on the strengthening of power
In the Qur'anic perspective
This research aims to find out "the effectiveness of the self-questioning strategy in the achievement of students Phase III institutes of teacher preparation and decision-making in chemistry." The researcher follows approach quasi-experimental with a post-test, and the sample consisted of (27) from " Teachers Training Institute-AL-Byaa "in Directorate of Education Baghdad Karkh / 2 students divided into two unequal groups: experimental its number (14) students studied using reciprocal teaching strategy and control its number (13) students have studied in the usual way.The two groups were equivalent extraneous variables.
The researcher was prepare achievement test consist of 40 items was the adoption of a measure of decision-makin
... Show MoreAmong Persian poets and literary works, Ferdowsi and Shahnameh have a distinctive and prominent place. Since the 5th C. AH , they took the interest of all Persian language and literature scholars and were one of the first books to be translated into different languages including Arabic by Al Fatih Bin Ali Bin Mohammed Al-Bandari in the year of (620)AH .Because it was completed in the early 7th C. AH and in terms of antiquity, there is no older copy than of Al-Bandari’s version which holds great value in the analysis of Shahnameh other different copies.
To find out the how far analogy goes, the present paper makes a general comparisons of Bijan and Manijeh in Shahnameh Fer
... Show MoreBoltzmann mach ine neural network bas been used to recognize the Arabic speech. Fast Fourier transl(>lmation algorithm has been used t() extract speciral 'features from an a caustic signal .
The spectral feature size is reduced by series of operations in
order to make it salable as input for a neural network which is used as a recogni zer by Boltzmann Machine Neural network which has been used as a recognizer for phonemes . A training set consist of a number of Arabic phoneme repesentations, is used to train lhe neuntl network.
The neural network recognized Arabic. After Boltzmann Machine Neura l network training the system with
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show More