Preferred Language
Articles
/
jcolang-729
Technique and music of letter poetry in Nali’s poetry: هونەر و مۆسیقای «پیتەشیعر» له شیعری نالیدا
...Show More Authors

Musicality is a fundamental feature of poetry that takes the interest of scholars and critics. Most poets rely on a variety of literary devices and techniques to bring music to their work like rhymes - words that appear at the end of lines in poetry - and on arranging words techniques in such a way to create a pseudo melody, which is achieved primarily by patterning (or repeating) certain sounds. Such a poetic rhetorical and verbal enhancer’s aspect represented ever since the beginning of the classical poetry has been manifested more evidently in Nali’s poetry. His poetry is marked with particular letters that have played a substantial role in the rhyming that rings like cymbals or jingle like internal elevated rhymes. Within a descriptive-analytical approach, the present study describes the musical techniques of Nali’s poetry, particularly of what is called letter poetry, and investigates the application of these letters as figures of rhetoric in Nali’s poetic style. The study traces the letter poetry types and its impacts on poetic meaning creation in the light of semantic framework.

کورته

مۆسیقای هۆنراوه هەر لە سەردەمانی کۆنەوه، گرنگییەکی تایبەتی پێ­دراوه و جێگەوپێگەیەکی ئەوتۆی له چوارچێوه و پەیەکەرەی شیعردا هەبووه. ئەم مۆسیقایه به ڕیزکردن و پات­بوونەوه و ڕێک­خستنی وشە و پیته لێکچوو و هاوئاهەنگەکان پەیدا دەبێت. هەر له شیعری کلاسیکەوه تا ئەمڕۆ ئەم تەکنیکه له ڕازه و هونەره جۆربەجۆرەکانی ڕەوانبێژیدا خۆی نواندووه و دەرکەوتووه. له شیعری نالیدا به شێوازێکی زەق و بەرچاو پات­بوونەوەی پیتێکی دیاریکراو له هەندێ له هۆنراوەکانیدا دەورێکی مۆسیقایی بەهێز و زۆر دیاری به ئەستۆ گرتووه و ئاواز و مۆسیقای شیعرەکەی بەرزتر کردۆتەوه. به شێوەیەک که دەکرێت ناوی ئەو پیته ببڕین به سەر ئەو هۆنراوەدا و به «پیتەشیعر» ناوزەدی بکەین. ئەم توێژینەوە به شێوازی تەوسیفی – لێکۆڵینەوەیی هەوڵی­داوه به خوێندنەوەی شیعرەکانی نالی هونەر و مۆسیقا و دەوری پیتەشیعر ڕوون­بکاتەوه و وەک تەکنیک و هونەرێک له شێواز و شیعری نالیدا بیناسێنێت. له ئاکامدا توانیویه چەشن و کاریگەری و بەتایبەت لایەنە واتاییەکانی ئەم هونەره له شیعری نالیدا بخاته بەر چاو و تیشکی لێکۆڵینەوه و ڕاڤه و شرۆڤەیان لێ­بدات.

 

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat May 25 2019
Journal Name
Journal Of Physical Education
تأثير استخدام الاسلوب الشامل وفق توقيتي التغذية الراجعة ( الفورية و المتأخرة) في تعلم مهارة الغطس في الجمناستك الفني للرجال والاحتفاظ بها
...Show More Authors

هدف البحث إلى التعرف على تأثيراستخدام الاسلوب الشامل وفق توقيتي التغذية الراجعة (الفورية والمتأخرة) في تعلم مهارة الغطس في الجمناستك الفني للرجال والاحتفاظ بها ، والتعرف على أفضل اسلوب من بين الأساليب الثلاثة ( الشامل وفق التغذية الراجعة الفورية ، الشامل وفق التغذية الراجعة المتأخرة ، الاسلوب التقليدي المتبع ) في تعلم مهارة الغطس في الجمناستك الفني للرجال والاحتفاظ بها. استخدم الباحث الم

... Show More
Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
New DCT-Based Image Hiding Technique
...Show More Authors

A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.

View Publication Preview PDF
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Signature Verification Based on Moments Technique
...Show More Authors

In this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
Graphical password based mouse behavior technique
...Show More Authors
Abstract<p>This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.</p><p>This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance</p> ... Show More
View Publication
Scopus (12)
Crossref (5)
Scopus Crossref
Publication Date
Mon Jan 02 2012
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Image encryption technique using Lagrange interpolation
...Show More Authors

Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Technique for Solving Autonomous Equations
...Show More Authors

This paper demonstrates a new technique based on a combined form of the new transform method with homotopy perturbation method to find the suitable accurate solution of autonomous Equations with initial condition.  This technique is called the transform homotopy perturbation method (THPM). It can be used to solve the problems without resorting to the frequency domain.The implementation of the suggested method demonstrates the usefulness in finding exact solution for linear and nonlinear problems. The practical results show the efficiency and reliability of technique and easier implemented than HPM in finding exact solutions.Finally, all algorithms in this paper implemented in MATLAB version 7.12.

 

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Spectral Technique for Baud Time Estimation
...Show More Authors

A new approach for baud time (or baud rate) estimation of a random binary signal is presented. This approach utilizes the spectrum of the signal after nonlinear processing in a way that the estimation error can be reduced by simply increasing the number of the processed samples instead of increasing the sampling rate. The spectrum of the new signal is shown to give an accurate estimate about the baud time when there is no apriory information or any restricting preassumptions. The performance of the estimator for random binary square waves perturbed by white Gaussian noise and ISI is evaluated and compared with that of the conventional estimator of the zero crossing detector.

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 20 2024
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Review using continuous flow injection analysis technique in the determination of several drugs
...Show More Authors

Continuous flow injection analysis (CFIA) is one of the simplest, easiest, and multilateral analytical automation methods in moist chemical analysis. This method depends on changing the physical and chemical properties of a part of the specimen spread out from the specimen injected into the carrier stream. The CFIA technique uses automatic analysis of samples with high efficiency. The CFIA PC compatibility also allows specimens to be treated automatically, reagents to be added, and reaction conditions to be closely monitored. The CFIA is one of the automated chemical analysis methods in which a successive specimen sample is to be estimated and injected into a vector stream from a flowing solution that meets the reagent and mixes at a spe

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat May 09 2015
Journal Name
International Journal Of Innovations In Scientific Engineering
USING ARTIFICIAL NEURAL NETWORK TECHNIQUE FOR THE ESTIMATION OF CD CONCENTRATION IN CONTAMINATED SOILS
...Show More Authors

The aim of this paper is to design artificial neural network as an alternative accurate tool to estimate concentration of Cadmium in contaminated soils for any depth and time. First, fifty soil samples were harvested from a phytoremediated contaminated site located in Qanat Aljaeesh in Baghdad city in Iraq. Second, a series of measurements were performed on the soil samples. The inputs are the soil depth, the time, and the soil parameters but the output is the concentration of Cu in the soil for depth x and time t. Third, design an ANN and its performance was evaluated using a test data set and then applied to estimate the concentration of Cadmium. The performance of the ANN technique was compared with the traditional laboratory inspecting

... Show More
View Publication
Publication Date
Tue Jan 05 2016
Journal Name
Iraqi Journal Of Science
Local Study of blaCTX-M genes detection in Proteus spp. by using PCR technique
...Show More Authors

n this study, 25 clinical isolates of Proteus spp. were collected from urine, wounds and burns specimens from different hospitals in Baghdad city, all isolates were identified by using different bacteriological media, biochemical assays and Vitek-2 system. It was found that 15 (60%) isolates were identifies as Proteus mirabilis and 10 (40 %) isolates were Proteus vulgaris. The susceptibility of P. mirabilis and P. vulgaris isolates towards cefotaxime was (66.6 %) and (44.4 %) respectively; while the susceptibility of P. mirabilis and P. vulgaris isolates towards ceftazidime was (20%). Extended spectrum β-lactamses producing Proteus was (30.7 %). DNA of 10 isolates of P. mirabilis and 4 isolates of P. vulgaris were extracted and de

... Show More