Preferred Language
Articles
/
jcois-1070
The authority of the ancient text in the poetry of Bashar bin Bard
...Show More Authors

Abstract

Heritage represents the center around which poets revolve around and take advantage of its inexhaustible specific, and the connotations that this heritage holds of various values, values ​​and ideas, and the poet Bashar bin Bard from prominent poets who were inspired by that heritage and the culture of the first Abbasid era and whoever and others was worthy of studying and tracking his potentials and capabilities Creativity is based on the inspiration of the legacy of his predecessors, and the development of this legacy and renewal in it. The research methodology required its division into two topics, the first topic, a description of the beauty of women, a description of wine, while the second topic is a description of hatred and selfishness, a description of the night, a description of war and weapons, and a conclusion that included the most prominent results of the research that came Search by

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Translating Poetry: Possibility or Impossibility?
...Show More Authors

Translating poetry is considered one of the most complicated types of translations. It
encounters many difficulties, the most important of which is the question of possibility or
impossibility of translating poetry. So, it is better to start by asking the following question: is
the translation of poetry possible? Or is it impossible? It is definitely a rhetorical question
because translation is as old as the presence of translated texts, which fills the shelves of
libraries. One can ask despite these difficulties, who would discourage people of the world
from translating poetry merely because it is fundamentally impossible? (Mann, 1970: 211)
The present paper will elaborate, in more detail, upon the necessary traits

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 15 2017
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Graph-Based Text Representation: A Survey of Current Approaches
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Proverbs and preaching Sermons in Pre-Islamic Poetry and their indications Peacefulness
...Show More Authors

Proverbs and preaching Sermons in Pre-Islamic Poetry and their indications Peacefulness

View Publication Preview PDF
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of The College Of Languages (jcl)
استنطاق النص الصوفي الأندلســــي
...Show More Authors

Heading of this research, to interrogate the text Sufi Andalusia, one of the displayed cognitive embodied the spirit of the experiment with Walsh nudity Sufi, who ascended to the world of spirituality within their experience of poetry, taking pictures of the perceived symbol cognitively carry through to the worlds transparent based Almwaged related Bashan soul and heart, has tried to invest communicative potential offered by .      

View Publication Preview PDF
Publication Date
Fri Nov 15 2024
Journal Name
الاستاذ
اثر القرائن وصورها في النص القراني
...Show More Authors

The research aims to clarify the effect of evidence in interpreting verses and what are their forms related to interpretation, which every interpreter must be familiar with, along with the necessity of knowing the sciences with which the interpreter is armed in order for the true meaning and intended meaning of the Qur’anic verses to emerge. The determinants of the clues and the extent of their relationship to the Qur’anic text were also explained, and the levels of their impact in directing the meaning were identified in terms of strength, verification, clarity, generality and

Publication Date
Tue Sep 27 2022
Journal Name
Arab Science Heritage Journal
قضية قانونية من العهد الاشوري القديم في بلاد الأناضول
...Show More Authors

  Assyrian merchants established in the second millennium BC Assyrian commercial settlements in Anatolia, and these settlements had a great cultural value

View Publication Preview PDF
Publication Date
Tue Sep 27 2022
Journal Name
Arab Science Heritage Journal
قضية قانونية من العهد الاشوري القديم في بلاد الأناضول
...Show More Authors

  Assyrian merchants established in the second millennium BC Assyrian commercial settlements in Anatolia, and these settlements had a great cultural value

View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2006
Journal Name
Political Sciences Journal
ملامح من فكرة القانون الطبيعي في حضارة العراق القديم
...Show More Authors

ملامح من فكرة القانون الطبيعي في حضارة العراق القديم

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref