Preferred Language
Articles
/
jcolang-642
Examples of a Simile in the Poetry of Khwaju Kermani: نمونه هانى از تشبيه در اشعار خواجو كرمانى
...Show More Authors

A simile is a figure of speech that draws resemblance with the help of the words such as (like) or any other closer in meaning word. The present paper deals with the theme of a simile in the poetry of Khwaju Kermani, a truly great Persian poet. 

Besides being a great poet, Khwaju Kermani was also a fine professor of sciences. He was, also, known by his ghazals in which he imitated and was influenced by two of the most immense poets (Saadi) and (Hakim Sanai).

The search for knowledge, the pursue of studies and interpretation are among the main themes of Khwaju Kermani’s poetry. He uses ghazals to express love and longing in a mystical manner.

The present paper discusses the poet’s life, ethics and works.  It, also, defines a simile and gives an account of its different types. The final part of the study deals with and  points out some of the most important similes in Khwaju Kermani poetry.

  

  تشبيه ، دلالت بر مشاركت امرى با امرى ديكرى در يك معنى بوسيله ى كلمه(جون) يا هر عبارتى كه جاى كزين آن مى باشد. ما در بزوهش تشبيه را در اشعار يك شاعر مشهور ايرانى (خواجو كرمانى) بررسى كرديم.

    شاعر ما در اكثر علوم استادى ماهر بود ودر غزل شيوه ى خاص دارد. سبك بعضى از غزلهاى او بطرز سخن سعدى نزديكست هم جنين به سخن حكيم سنائى متوجه داشت وغزل اورا تضمين وتخمين كرده است.

    در قصايد خواجو كرمانى معانى حديث واخبار وتفسير ملاحظه مى كردد، غزلهاى او عاشقانه وشور انكيز است واكثر ترجيحاتش عارفانه وطرب انكيز است.

   ما درين اين بزوهش سعى كرديم تا اطلاعاتى از زندكى وسبك وآثار وعقيده اين شاعر بنوسيم همراه با تعريفى از وازه ى تشبيه وانواع آن وبالاخره مبحثى از بكار بردن تشبيه در اشعار اين شاعر ضميمه كرديم. واميدواريم كه موفق بشويم.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Mar 31 2025
Journal Name
Iraqi Statisticians Journal
Hypothesis Testing for Non-Normal Multiple Compact Regression Model
...Show More Authors

Generalized multivariate transmuted Bessel distribution belongs to the family of probability distributions with a symmetric heavy tail. It is considered a mixed continuous probability distribution. It is the result of mixing the multivariate Gaussian mixture distribution with the generalized inverse normal distribution. On this basis, the paper will study a multiple compact regression model when the random error follows a generalized multivariate transmuted Bessel distribution. Assuming that the shape parameters are known, the parameters of the multiple compact regression model will be estimated using the maximum likelihood method and Bayesian approach depending on non-informative prior information. In addition, the Bayes factor was used

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 20 2024
Journal Name
Fizjoterapia Polska
Development Artificial Neural Network (ANN) computing model to analyses men's 100¬meter sprint performance trends
...Show More Authors

Coaches and analysts face a significant challenge of inaccurate estimation when analyzing Men's 100 Meter Sprint Performance, particularly when there is limited data available. This necessitates the use of modern technologies to address the problem of inaccurate estimation. Unfortunately, current methods used to estimate Men's 100 Meter Sprint Performance indexes in Iraq are ineffective, highlighting the need to adopt new and advanced technologies that are fast, accurate, and flexible. Therefore, the objective of this study was to utilize an advanced method known as artificial neural networks to estimate four key indexes: Accelerate First of 10 meters, Speed Rate, Time First of 10 meters, and Reaction Time. The application of artifi

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Oct 01 2012
Journal Name
Al–bahith Al–a'alami
Internet and Press Blogging
...Show More Authors

The emergence of the Internet and its transformation in the early nineties of the last century led to a means of mass communication that brought about significant structural changes in the media map.

Over the course of historical development, the public did not engage the media in its behavior in the implementation and dissemination of an idea, generalization or theory put forward by media experts or practitioners through these means to do it. Blogs represent the most important service provided by the Internet in recent years which has gained special importance in the media field. Where the word “Blogs” has several names: (alternative media), (blogging press), (popular press) and other names.

The medi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Diagnosing Pilgrimage Common Diseases by Interactive Multimedia Courseware
...Show More Authors

In this study, we attempt to provide healthcare service to the pilgrims. This study describes how a multimedia courseware can be used in making the pilgrims aware of the common diseases that are present in Saudi Arabia during the pilgrimage. The multimedia courseware will also be used in providing some information about the symptoms of these diseases, and how each of them can be treated. The multimedia courseware contains a virtual representation of a hospital, some videos of actual cases of patients, and authentic learning activities intended to enhance health competencies during the pilgrimage. An examination of the courseware was conducted so as to study the manner in which the elements of the courseware are applied in real-time learn

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Jun 30 2024
Journal Name
حوليات أداب عين شمس
المنظور الزمني وعلاقته بجودة الحياة الاكاديمية لدى طلبة جامعة بغداد
...Show More Authors

Abstract The aim of the current research is to identify the time perspective and the quality of academic life of Baghdad University students. The research also aims to identify the relationship between the time perspective and the academic quality of Baghdad University students and the extent to which the time perspective dimension of academic quality contributes to the identification of the difference between the time perspectives in terms of gender. Finally, the research aims to identify if there is a significant difference in the quality of academic life between males and females. The scales were applied to a number of (434) university male and female student. A one-sample t-test, a two-sample t-test, the analysis of the variation, the P

... Show More
View Publication
Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
An Algorithm for nth Order Intgro-Differential Equations by Using Hermite Wavelets Functions
...Show More Authors

In this paper, the construction of Hermite wavelets functions and their operational matrix of integration is presented. The Hermite wavelets method is applied to solve nth order Volterra integro diferential equations (VIDE) by expanding the unknown functions, as series in terms of Hermite wavelets with unknown coefficients. Finally, two examples are given

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Detecting Textual Propaganda Using Machine Learning Techniques
...Show More Authors

Social Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation.  Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annota

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref