
This study falls within the core of the deliberative theory, as this research seeks to highlight the concept of dialogical imputation that is present in all the discourses received by the recipient, and that this is not limited to dialogues, and that is why it is called (deliberative imperative). This is in agreement with the deliberative and functional approach that sees literary discourse as a dialogical and fulfilling necessity, due to its attachment to artistic connotations and submerged meanings in the saying. The allotted obligation and its impact on determining the purposes: The specific implication represented an important axis of pragmatic research, and a major concern in the work of discourse analysis. Because of its great importa
... Show MoreOnomatopoeia has always been a functional poetic device which enjoys a high sound significance in the poetry of many languages. In modern English and Arabic poetry alike, it proves to be vital and useful at different levels: musical, thematic and at the level of meaning. Still, the cultural difference looms large over the ways it is employed by the poets of each. The present paper investigates the employment of onomatopoeia in the poetry of D. H. Lawrence (1885-1930) and Badr Shakir al-Sayyab (1926-1964) who are chosen due to the importance they enjoy in modern English and Arabic poetry and the richness of their poems in onomatopoeias. The conclusions reached at are in a sense related to cultural differences which govern the use of onomato
... Show MoreIt is the grace of God and his grace that he accepts repentance for his slaves, forgives their bad deeds in return for their misfortune, or offers them a good deed, but pardons many of them for free. Therefore, it is not long for God Almighty to forgive His mercy for many of His slaves and bring them to Paradise with no punishment or punishment, even if they have committed some sins, because of the multitude of their favorable navigational disadvantages, or even without gratitude thanks to him and him. With all this, some have overlooked the old and new on these things and amazed at the hadeeth ((God may have seen the people of the full moon and said do what you want, I have forgiven you)). Therefore, the scholars tried to answer some of
... Show MoreThis research is a modest effort to talk about the great world of ancient lineage, Imam Majd al-Din Abu Saadat, known as Ibn al-Atheer island, through the statement of his name, surname, nickname, family, elders and his pupils and his most important works.
It also deals with the modern research on his famous book in the field of modern science called (the end in the strange talk and impact), which is one of the most wonderful books of modern and especially the strange talk, through the scientific effort of the Imam and the importance of the book and methodology, and the most prominent aspects of the service and care of Ibn Al Atheer For the modern stranger, which boils down to two aspects:
First: the linguistic rooting of the stran
This paper compares between the direct and indirect georeferencing techniques in Photogrammetry bases on a simulation model. A flight plan is designed which consists of three strips with nine overlapped images for each strip by a (Canon 500D) digital camera with a resolution of 15 Mega Pixels.
The triangulation computations are carried out by using (ERDAS LPS) software, and the direct measurements are taken directly on the simulated model to substitute using GPS/INS in real case. Two computational tests have been implemented to evaluate the positional accuracy for the whole model and the Root Mean Square Error (RMSE) relating to (30) check points show that th
... Show MoreB Saleem, H Alwan, L Khalid, Journal of Engineering, 2011 - Cited by 2
The research is to identify the legend of the seven eyes amulet of Babylonian origin and the representations it carried of the link between the Babylonian past and the Islamic present presented in the design works of the promoted products, preserving its impact in the souls as a way to avoid the act of envy, and from this was the research problem that I want to get answers to, which That is (How was the legend of the seven-eyes amulet represented in the design of industrial products?), making its goal to identify how that legend was represented within the design work of marketed industrial products, and in order to reach the answer, the research presented many concepts starting with the legend in its various forms in industrial products.
... Show MoreBuried pipeline systems are commonly used to transport water, sewage, natural oil/gas and other materials. The beneficial of using geogrid reinforcement is to increase the bearing capacity of the soil and decrease the load transfer to the underground structures.
This paper deals with simulation of the buried pipe problem numerically by finite elements method using the newest version of PLAXIS-3D software. Rajkumar and Ilamaruthi's study, 2008 has been selected to be reanalyzed as 3D problem because it is containing all the properties needed by the program such as the modulus of elasticity, Poisson's ratio, angle of internal friction. It was found that the results
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More