Prepositions have a key function, which is to associate parts of a sentence, called letters In addition, it adds the meanings of the verbs to the names, ie reached by them, and called by the coffin characters Qualities..
I chose to search for the meaning of the preposition "from" in Surat Maryam to know its meanings in terms of originality and expansion, so the title of the research (the meanings of preposition "from" in terms of originality and expansion in Surat Maryam model(
This paper examines the use of one of the most common linguistic devices which is hyperbole. It shows how hyperbolic devices are used as an aspect of exaggeration or overstatement for an extra effect in which the speaker can use hyperbole to add something extra to a situation in order to exaggerate his idea or speech. It is, like other figures of speech, used to express a negative or positive attitude of a specific unit of language. Thus, this paper is set against a background of using hyperbole concerning two main fields (advertisements and propaganda). So, the use of hyperbole will be implied by analyzing them concerning their meaning) literal and non-literal). Methodology of this
... Show MorePermeability is one of the essential petrophysical properties of rocks, reflecting the rock's ability to pass fluids. It is considered the basis for building any model to predict well deliverability. Yamama formation carbonate rocks are distinguished by sedimentary cycles that separate formation into reservoir units and insulating layers, a very complex porous system caused by secondary porosity due to substitute and dissolution processes. Those factors create permeability variables and vary significantly. Three ways used for permeability calculation, the firstly was the classical method, which only related the permeability to the porosity, resulting in a weak relationship. Secondly, the flow zone indicator (FZI) was divided reservoir into
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe sustainable development according to the United Nation, listed firms throughout globally now routinely provide sustainability data. However, there is not enough information on Sustainability Performance Quality (SPQ) in the majority of emerging economies, including Malaysia. This study looks at how the SPQ of the top 100 Malaysian-listed businesses is affected by factors as connected with corporate governance (e.g., board meeting, board size, and board ethnic diversity). Utilizing 500 firm-year data, a longitudinal sample of 500 nonfinancial firms on the Bursa Malaysia for 2015-2019 is employed in this study. The findings from the analysis using the panel regression demonstrated that: ethnic diversity and board siz
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe introduction of concrete damage plasticity material models has significantly improved the accuracy with which the concrete structural elements can be predicted in terms of their structural response. Research into this method's accuracy in analyzing complex concrete forms has been limited. A damage model combined with a plasticity model, based on continuum damage mechanics, is recommended for effectively predicting and simulating concrete behaviour. The damage parameters, such as compressive and tensile damages, can be defined to simulate concrete behavior in a damaged-plasticity model accurately. This research aims to propose an analytical model for assessing concrete compressive damage based on stiffness deterioration. The prop
... Show More