One of the prominent goals of Metrical Phonology Theory is providing stress of poetry on the syllable-, the foot-, and the phonological word- levels. Analysing poetry is one of the most prominent and controversial issues for the involved number and types of syllables, feet, and meters are stable in poetry compared to other literary texts. The prosodic seeds of the theory have been planted by Firth (1948) in English, while in Arabic يديهارفلا in the second half of the eighth century (A.D.) has done so. Investigating the metrical structure of poetry has been conducted in various languages, whereas scrutinising the metrical structure of English and Arabic poetry has received little attention. This study aims at capturing the similarities and differences between Classical English and Arabic poetry manifested in the value of one metrical parameter. To achieve this aim ten lines of Classical English and Arabic poetry are decided upon to undergo the scanning of the one metrical parameter along the lines of Pearl, et al. (2009). This parameter is extrametricality which allows ignoring the peripheral elements when capturing the metrical structure of poetry. The main conclusion has shown that Classical English Poetry indicates extrametricality more than Classical Arabic Poetry.
The Log-Logistic distribution is one of the important statistical distributions as it can be applied in many fields and biological experiments and other experiments, and its importance comes from the importance of determining the survival function of those experiments. The research will be summarized in making a comparison between the method of maximum likelihood and the method of least squares and the method of weighted least squares to estimate the parameters and survival function of the log-logistic distribution using the comparison criteria MSE, MAPE, IMSE, and this research was applied to real data for breast cancer patients. The results showed that the method of Maximum likelihood best in the case of estimating the paramete
... Show MoreIn this paper, a compact genetic algorithm (CGA) is enhanced by integrating its selection strategy with a steepest descent algorithm (SDA) as a local search method to give I-CGA-SDA. This system is an attempt to avoid the large CPU time and computational complexity of the standard genetic algorithm. Here, CGA dramatically reduces the number of bits required to store the population and has a faster convergence. Consequently, this integrated system is used to optimize the maximum likelihood function lnL(φ1, θ1) of the mixed model. Simulation results based on MSE were compared with those obtained from the SDA and showed that the hybrid genetic algorithm (HGA) and I-CGA-SDA can give a good estimator of (φ1, θ1) for the ARMA(1,1) model. Anot
... Show MoreStatistics indicate criminal in most countries of the world that the suicide rate continues to increase, as it prevalence manufacturing and complexity of life and the intensification of conflicts and escalating problems of rising suicide rates. And suicide is death intentional, that is, the intentional act that leads to ending the life of the individual and self-on purpose. The current research aims to identify the suicide in terms of its causes and its factors and come up with recommendations for the prevention of suicide. Because suicide is a life-threatening problem has tried several theories of interpretation and stand on its grounds. Considering the theories of psychoanalysis (Freud) that suicide is the result of the individ
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThis work represents development and implementation a programmable model for evaluating pumping technique and spectroscopic properties of solid state laser, as well as designing and constructing a suitable software program to simulate this techniques . A study of a new approach for Diode Pumped Solid State Laser systems (DPSSL), to build the optimum path technology and to manufacture a new solid state laser gain medium. From this model the threshold input power, output power optimum transmission, slop efficiency and available power were predicted. different systems configuration of diode pumped solid state laser for side pumping, end pump method using different shape type (rod,slab,disk) three main parameters are (energy transfer efficie
... Show More