Preferred Language
Articles
/
jcolang-61
ההשגה על טקסטי התנ"ך ביצירות סופרים עבריים פרופ. עוזר ד"ר. עדנאן שביב ג'אסם
...Show More Authors

תקציר

העיון הזה מדבר על דבר ההשגה על הטקסטים המקראיים בידי כמה מסופרים ופילוסופים יהודים אשר הושפעו מהרעיונותיהם של הפילוסופים האירופיים מחד גיסא, ואת הרעיונות של ההשכלה מאידך גיסא. היהודים היו חיים בבידוד, ותחת השליטה של הרבנות (רבנים) שהייתה שליטה מוחלטת. כבר העבודה של הרבנות מאז ימי קדם להעלות רעיונות במוחם של היהודים בתור העם הנבחר, והם מעולים ועדיפים על בני אדם. הם כל כך מסתמכים על פסוקים מהתורה, ולפרש בהתאם למה שמשרת הרעיונות והגישות שלהם.  זו היתה ההנהגה היהודית, לעומת זאת, הרבנות במשך מאות שנים הצליחה לגבש במוחם של היהודים רעיונות אלה שאין להם שום קשר עם המציאות, ועוד לא הגיוניים ולא רציניים. הרעיון של כפיפות של העםים כלפי היהודים לעבוד למען ההנאתם נחשבים מהרעיונות שהיהודים מאמינים ברצינותם למשל בפסוק המקרא האומר: (עשיו, גבר שיודע ודייג ושדה, יעקב יושב אוהלים) (בראשית 24.27)

לאחר הופעת רעיונות ההשכלה והתפשטותם בין הקהילה היהודית ופעתה של הספרות העברית המודרנית, שהכיל את עקרונות ההשכלה החלו סופרים ונלחמו למתוח ביקורת על המסורת העברית וההתעמות עם תנועות דתיות ואנשי דת יהודים, שרבים מהם ניסו לעשות שינויים בחיים ולהעלות את הסיסמה של ההתבוללות. למרות קדושת טקסטים דתיים עם היהודים אך הסופרים המשכילים ביקרו אותם בגלל חוסר רצינות וחוסר ההתאמה עם המציאות שמראה דבר אחר, וזה בגלל מצב היהודים העלוב והנסיבות שאפפו אותם באותה תקופה לכן סופרים רבים המרמרו מטקסטים מקראיים במיוחד אלה מרגיעים ויועדים כי היהודים יהיו בחיים נוחים ויפים. לכן, חלק מן הסופרים סירבו את רעיונות אלה, שנחשבו לסיבה שהיהודים אינם מסוגלים לבצע את המטרות שלהם, על כן השיגו בחריפות וביקרו אותם בעוקצנות, כדי לעורר את העם היהודי לעבוד ברצינות ולהשתען על סמכות הששכל ולדחות שלטון החכמים. גם  לשחרר את היהודים מהרעיונות הקדומות הבורים.

Abstract

      This study deals with biblical texts resistance by expressed some Jewish writers and philosophers who were influenced by the ideas of European philosophers, and the ideas of the Enlightenment. Jews were living in isolation, and under the control of the Rabbinate (rabbis) had total control.

      Religious Scholars have been working since a long time to instill ideas in the minds of Jews as being the chosen people, and that they are distinguished and superior to humans. So they relied on verses from Torah, and interpreted tham according to what serves their ideas and approaches. It was the Jewish leadership, however, the Religious scholars for centuries managed to consolidate in the Jews mind these ideas that have no connection with reality, being logical and unserious. The idea of subordination of nations to them and work for their own pleasure that considered earnestness ideas that believe in the Bible's verse that says, for example: (Esau, a man who knows hunting and field, Jacob dwelt in tents) (Genesis 24.27 (

After the advent of the Enlightenment and the spread between the Jewish community and the bleating of Modern Hebrew literature, which contained the principles of the Enlightenment, writers fought to criticize the Jewish tradition and to confront religious movements and religious Jews. Many of them tried to make changes in life and raise the slogan of assimilation. Despite sanctity of religious texts by Jews, the educated writers criticized and refused them due to the lack of seriousness and reality, and that's because of the situation of Jews poverty and similar surrounding circumstances. Therefore, some of the writers refused the ideas that considered the reason that made them unable to achieve their aims, and objected strongly and criticized them sarcastically, to provoke the Jewish people to work seriously and rely on the authority of reason and reject the religious authority, and free people from the old-fashioned ideas.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Voice Identification Using MFCC and Vector Quantization
...Show More Authors

The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Watermark Based on Singular Value Decomposition
...Show More Authors

Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Effect of the professional skepticism characteristics of the auditor on audit qualit
...Show More Authors

The professional skepticism is one of the fundamental concepts necessary for practicing the audit profession, without which the auditor can not reach a reasonable assurance as to the correctness of the evidence and the information obtained by the auditing department. The auditor's possession of the characteristics of professional skepticism and his practice of professional skepticism during the audit process lead to an increase The quality of audit and thus raise the confidence of the financial community in the audit profession again after the exposure of several crises led to the loss of financial society confidence in the audit profession.

The aim of the study is to measure the impact of professional sk

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Optimum Median Filter Based on Crow Optimization Algorithm
...Show More Authors

          A novel median filter based on crow optimization algorithms (OMF) is suggested to reduce the random salt and pepper noise and improve the quality of the RGB-colored and gray images. The fundamental idea of the approach is that first, the crow optimization algorithm detects noise pixels, and that replacing them with an optimum median value depending on a criterion of maximization fitness function. Finally, the standard measure peak signal-to-noise ratio (PSNR), Structural Similarity, absolute square error and mean square error have been used to test the performance of suggested filters (original and improved median filter) used to removed noise from images. It achieves the simulation based on MATLAB R2019b and the resul

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Image Hiding Using Discrete Cosine Transform
...Show More Authors

Steganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.

View Publication Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Study the Factors Effecting on Welding Joint of Dissimilar Metals
...Show More Authors

The aim of this work is to study the factors that affect the welding joint of dissimilar metals. Austenitic stainless steel-type AISI (316L) with a thickness of (2mm) was welded to carbon steel (1mm) using an MIG spot welding.  The filler metal is a welding wire of the type E80S-G (according to AWS) is used with (1.2mm) diameter and CO2 is used as shielding gas with flow rate (7L/min) for all times was used in this work.

        The results indicate that the increase of the welding current tends to increase the size of spot weld, and also increases the sheer force.  Whereas the sheer force increased inversely with the time of welding. Furthermore, the results indicate that i

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
The Impact of Plagiarism on the Quality of Scientific Researches “Empirical Study”
...Show More Authors

The purpose of this research is to study the quality of scientific research at the University of Baghdad in light of scientific piracy and plagiarism of research and results and attribute it to others intentionally or unintentionally. Proactive writing such as stealing ideas or synthesizing the results of one another over others and its negative impact on the quality of scientific outputs and the reputation of educational organizations through an exploratory study in the faculties of the University of Baghdad, scientific and humanitarian. As for the aims of the study, it was determined by determining the negative impact of piracy on scientific research. A Likert five-point scale was used in this research. The research community c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 02 2007
Journal Name
Political Sciences Journal
عرض كتاب على خط النار مذكرات الرئيس الباكستاني
...Show More Authors

عرض كتاب على خط النار مذكرات الرئيس الباكستاني

View Publication Preview PDF
Crossref
Publication Date
Mon Jan 11 2021
Journal Name
Journal Of Planner And Development
The impact of recycling abandoned sites on sustainable development
...Show More Authors

In today's cities, it is easy to see large numbers of vacant lands and unused abandoned sites in downtown areas that are not only ugly but also potentially becoming fertile ground for criminal activities that endanger residents and visitors and contribute to the further degradation of neighborhoods,

can provide reuse of spaces Neglected opportunities to reshape the appearance of the city and to improve the city center for its users that the presence of many neglected sites, whether they were abandoned buildings or sites for destroyed buildings in Mosul after the war on ISIS and with large areas amid the urban fabric led to the emergence of the research problem is (lack of urban planning to reactivate abandoned sites within the ci

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Adopting statistical methods for controlling the quality of drinking water to achieve customer satisfaction
...Show More Authors

The current research aims to adopt production quality decisions as the most important decisions , because they are accompanied by customer satisfaction through monitoring the quality of drinking water in iraq which reach through the pipeline network associated with water treatment projects of Tigris and Euphrates rivers. One of the indicators of quality control was the drawing of the C-chart by specifying the central line and the upper and lower limit of the control and the diagnosis of whether the production system as a whole within the scope of quality control or not and determine the strength and significance of the correlation between the quantities of water And actual needs for customers , the research has reached a number o

... Show More
View Publication Preview PDF
Crossref