Arabic prose poem and the antithesis of contrast: poetry _ prose and West _ East
This study focused on spectral clustering (SC) and three-constraint affinity matrix spectral clustering (3CAM-SC) to determine the number of clusters and the membership of the clusters of the COST 2100 channel model (C2CM) multipath dataset simultaneously. Various multipath clustering approaches solve only the number of clusters without taking into consideration the membership of clusters. The problem of giving only the number of clusters is that there is no assurance that the membership of the multipath clusters is accurate even though the number of clusters is correct. SC and 3CAM-SC aimed to solve this problem by determining the membership of the clusters. The cluster and the cluster count were then computed through the cluster-wise J
... Show MoreThe members of the family of Eentrobacteriaceae harbour a gene cluster called polyketide synthase (pks) island. This cluster is responsible for the synthesis of the genotoxin colibactin that might have an important role in the induction of double-strand DNA breaks, leading to promote human colorectal cancer (CRC). Eleven out of the eighty eight isolates (12.5%) were pks+, distributed as 7 (8%) isolates of E. coli, 2 (2.25%) of K. pneumoniae and 2 (2.25%) of E. aerogenes. The cytotoxic effects of selected pks+ isolates (E. coli and E. aerogenes) on HeLa cells were represented by decreasing cell numbers and enlarged cell nuclei in comparison to the untreated cells. Cyt
... Show MoreThe present study aims to identify the role of behavioral disorders (anxiety disorder, behavior disorder "behavior", confrontation and challenge disorder, aggressive behavior) in predicting bullying patterns (verbal, physical, electronic, school) in a sample of adolescents with autism spectrum disorder. For this purpose, the researcher developed scales to measure the behavioral disorders and the bullying patterns among adolescents with autism spectrum disorder. The researcher adopted the descriptive survey approach. The study sample consists of (80) adolescents with autism spectrum disorder with ages range from (15-19 years) and (45-53 years old) in association with israr association for people with special needs in the northern borders
... Show Moreشكلت التطورات التكنولوجية في وسائل التواصل الاجتماعي الناجمة عن العولمة معلم رئيسي في تحولات التنظيمات الإرهابية، وإنتاج انماط جديدة من الإرهابيين والمتطرفين القادرين على التفاعل مع الثورة المعلوماتية والاتصالية. ان معظم الجرائم الإرهابية الإلكترونية مرتبطة بالإنترنت وهو المسرح المفضل للمتطرفين فالأول يقتل والثاني يسوغ ويحرض ويجند، والذي جعل الإنترنت وسيلة فعالة كونها سهلة الاستخدام وسريعة الوصول إلى
... Show MoreThis study was conducted to investigate thyroid function and Anti-Müllerian hormone (AMH) in (Chronic kidney disease) CKD patients by evaluating their levels in CKD patients, 50 patients were diagnosed to have CKD stage-5, their ages ranged between 20-50 years (25 males and 25 females) who attended the Nephrology and Transplant Center in Medical City of Baghdad- Iraq, they were recruited from April 2018 to July 2018 and were enrolled into the study. The control group consisted of 20 healthy individuals, their ages ranged between 20-48 years (10 males and 10 females). The study showed non-significant (p>0.05) increase in AMH level in CKD patients compared to the control group. On the other hand, TSH was recorded a highly significant (
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThe research addresses a pattern of imagery which is regarded a Prominent feature of Abi Tamaam's Poetry (the image of implicit simile) which is based on the hidden signified and the signifier which can be deduced out of context . The investigation requires a study whose proof is based on imagery which is of three types: natural proof , human proof and Quran proof . After handling the realistic structures of this image, the researcher has shifted attention to its types and has dealt with the psychological domain , dividing it in two types: the sensory image and the mental image. The research is directed towards studying the implicit sentence regarding its styles of expression : declarative expression and composition expression . The
... Show MoreMasnavi has considered one of the famous mold in Persian literature , who usually used Narrative , explanation and detailing long novels , for the double presented in the ancient Arabic literature as well . Did Masnavi template by Iraniens , or they used the same mold that the Arab termed it (double) . To answer this question , this essay will present samples of the term (doubles)in Arabic poetry with ancient Masnavies in Persian poetry .