Preferred Language
Articles
/
jcolang-729
Technique and music of letter poetry in Nali’s poetry: هونەر و مۆسیقای «پیتەشیعر» له شیعری نالیدا
...Show More Authors

Musicality is a fundamental feature of poetry that takes the interest of scholars and critics. Most poets rely on a variety of literary devices and techniques to bring music to their work like rhymes - words that appear at the end of lines in poetry - and on arranging words techniques in such a way to create a pseudo melody, which is achieved primarily by patterning (or repeating) certain sounds. Such a poetic rhetorical and verbal enhancer’s aspect represented ever since the beginning of the classical poetry has been manifested more evidently in Nali’s poetry. His poetry is marked with particular letters that have played a substantial role in the rhyming that rings like cymbals or jingle like internal elevated rhymes. Within a descriptive-analytical approach, the present study describes the musical techniques of Nali’s poetry, particularly of what is called letter poetry, and investigates the application of these letters as figures of rhetoric in Nali’s poetic style. The study traces the letter poetry types and its impacts on poetic meaning creation in the light of semantic framework.

کورته

مۆسیقای هۆنراوه هەر لە سەردەمانی کۆنەوه، گرنگییەکی تایبەتی پێ­دراوه و جێگەوپێگەیەکی ئەوتۆی له چوارچێوه و پەیەکەرەی شیعردا هەبووه. ئەم مۆسیقایه به ڕیزکردن و پات­بوونەوه و ڕێک­خستنی وشە و پیته لێکچوو و هاوئاهەنگەکان پەیدا دەبێت. هەر له شیعری کلاسیکەوه تا ئەمڕۆ ئەم تەکنیکه له ڕازه و هونەره جۆربەجۆرەکانی ڕەوانبێژیدا خۆی نواندووه و دەرکەوتووه. له شیعری نالیدا به شێوازێکی زەق و بەرچاو پات­بوونەوەی پیتێکی دیاریکراو له هەندێ له هۆنراوەکانیدا دەورێکی مۆسیقایی بەهێز و زۆر دیاری به ئەستۆ گرتووه و ئاواز و مۆسیقای شیعرەکەی بەرزتر کردۆتەوه. به شێوەیەک که دەکرێت ناوی ئەو پیته ببڕین به سەر ئەو هۆنراوەدا و به «پیتەشیعر» ناوزەدی بکەین. ئەم توێژینەوە به شێوازی تەوسیفی – لێکۆڵینەوەیی هەوڵی­داوه به خوێندنەوەی شیعرەکانی نالی هونەر و مۆسیقا و دەوری پیتەشیعر ڕوون­بکاتەوه و وەک تەکنیک و هونەرێک له شێواز و شیعری نالیدا بیناسێنێت. له ئاکامدا توانیویه چەشن و کاریگەری و بەتایبەت لایەنە واتاییەکانی ئەم هونەره له شیعری نالیدا بخاته بەر چاو و تیشکی لێکۆڵینەوه و ڕاڤه و شرۆڤەیان لێ­بدات.

 

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Physics
Monte Carlo Simulation for Bremsstrahlung Buildup Factor Produced by Absorption of Y-91 Beta Rays
...Show More Authors

This paper presents the first data for bremsstrahlung buildup factor (BBUF) produced by the complete absorption of Y-91 beta particles in different materials via the Monte Carlo simulation method. The bremsstrahlung buildup factors were computed for different thicknesses of water, concrete, aluminum, tin and lead. A single relation between the bremsstrahlung buildup factor BBUF with both the atomic number Z and thickness X of the shielding material has been suggested.

View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Annals Of The Romanian Society For Cell Biology
Molecular study to the fungus Neosetophomasamarorum was isolated from Al Chabaish marsh, South of Iraq
...Show More Authors

IA Ali, FK Emran, DF Salloom, Annals of the Romanian Society for Cell Biology, 2021

View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Dec 05 2017
Journal Name
International Journal Of Science And Research (ijsr)
Multi Response Optimization of Submerged Arc Welding Using Taguchi Fuzzy Logic Based on Utility Theory
...Show More Authors

Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
ADJUSTING OFF – CENTERING PROCESS FOR A BLOW MOLDED PLASTIC PRODUCT BY USE OF WINQSB SOFTWARE
...Show More Authors

In most manufacturing processes, and in spite of statistical control, several process capability indices refer to non conformance of the true mean (µc ) from the target mean ( µT ), and the variation is also high. In this paper, data have been analyzed and studied for a blow molded plastic product (Zahi Bottle) (ZB). WinQSB software was used to facilitate the statistical process control, and process capability analysis and some of capability indices. The relationship between different process capability indices and the true mean of the process were represented, and then with the standard deviation (σ ), of achievement of process capability value that can reduce the standard deviation value and improve production out of theoretical con

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 07 2024
Journal Name
Journal Of Ecological Engineering
Microwave assisted production of biodiesel using CaO nano-catalyst produced from mango fallen leaves extract
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sat Aug 24 2024
Journal Name
Mathematics
Identification of Time-Wise Thermal Diffusivity, Advection Velocity on the Free-Boundary Inverse Coefficient Problem
...Show More Authors

This paper is concerned with finding solutions to free-boundary inverse coefficient problems. Mathematically, we handle a one-dimensional non-homogeneous heat equation subject to initial and boundary conditions as well as non-localized integral observations of zeroth and first-order heat momentum. The direct problem is solved for the temperature distribution and the non-localized integral measurements using the Crank–Nicolson finite difference method. The inverse problem is solved by simultaneously finding the temperature distribution, the time-dependent free-boundary function indicating the location of the moving interface, and the time-wise thermal diffusivity or advection velocities. We reformulate the inverse problem as a non-

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Alexandria Engineering Journal
Comparison of some Bayesian estimation methods for type-I generalized extreme value distribution with simulation
...Show More Authors

The Weibull distribution is considered one of the Type-I Generalized Extreme Value (GEV) distribution, and it plays a crucial role in modeling extreme events in various fields, such as hydrology, finance, and environmental sciences. Bayesian methods play a strong, decisive role in estimating the parameters of the GEV distribution due to their ability to incorporate prior knowledge and handle small sample sizes effectively. In this research, we compare several shrinkage Bayesian estimation methods based on the squared error and the linear exponential loss functions. They were adopted and compared by the Monte Carlo simulation method. The performance of these methods is assessed based on their accuracy and computational efficiency in estimati

... Show More
View Publication
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Aug 05 2020
Journal Name
Advances In Civil Engineering
Strength compensation of deep beams with large web openings using carbon fiber–reinforced polymer sheets
...Show More Authors

This article presents the results of an experimental investigation of using carbon fiber–reinforced polymer sheets to enhance the behavior of reinforced concrete deep beams with large web openings in shear spans. A set of 18 specimens were fabricated and tested up to a failure to evaluate the structural performance in terms of cracking, deformation, and load-carrying capacity. All tested specimens were with 1500-mm length, 500-mm cross-sectional deep, and 150-mm wide. Parameters that studied were opening size, opening location, and the strengthening factor. Two deep beams were implemented as control specimens without opening and without strengthening. Eight deep beams were fabricated with openings but without strengthening, while

... Show More
Scopus (20)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Fri Nov 01 2019
Journal Name
International Journal On Interactive Design And Manufacturing (ijidem)
A real-time automated sorting of robotic vision system based on the interactive design approach
...Show More Authors

View Publication
Scopus (37)
Crossref (30)
Scopus Clarivate Crossref