This research deals with a part of our heritage and Arab culture, which is the poetry of contemporary Islamic poets, especially the poetry that was said in the mother in contemporary Islamic poetry, when extrapolating the offices of some contemporary Islamic poets found a clear presence of the mother, and during the search for the subject or its I found that the subject did not receive research and study, although the bureaus of contemporary Islamic poets included in it a huge amount of verses in which they stood at the mother Pharthua, and expressed their feelings and emotions towards them, and accordingly this research tagged (mother in contemporary Islamic poetry _ Dr Artistic models in models of contemporary Islamic poetry) to stand at models of those verses to study and demonstrate the technical skill of poets in the expression of the mother, I have adopted in my study this analytical method, as well as the dependence of various poets.
The present paper deal with the issue of the beginning of the culturally
renaissance in emirates of Arab Gulf from 1914-1945 between tow world war
has been attracting the attention of academic about the developments in many
fields in the Arab Gulf at this time.
The paper is divided into five sections. First section, deals with the
geographic importance for the Arab Gulf region. Second section, the economic
situations in the region before and after oil. The third section, talk for social
situations, like population, tribe and tribes in society, and immigration. The
fourth section, deals with the factors of rise the culture and political in the Arab
Gulf before discovery of oil period. The five section, the cultu
In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show MoreProducing pseudo-random numbers (PRN) with high performance is one of the important issues that attract many researchers today. This paper suggests pseudo-random number generator models that integrate Hopfield Neural Network (HNN) with fuzzy logic system to improve the randomness of the Hopfield Pseudo-random generator. The fuzzy logic system has been introduced to control the update of HNN parameters. The proposed model is compared with three state-ofthe-art baselines the results analysis using National Institute of Standards and Technology (NIST) statistical test and ENT test shows that the projected model is statistically significant in comparison to the baselines and this demonstrates the competency of neuro-fuzzy based model to produce
... Show MoreThe evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show MoreDue to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreThe research aims to identify the positives formulation entrances authors depending on the setting retaining the names of the authors of Arab veterans and cons of setting the entrances to Arab authors ancient depending on the nickname by desktop diligence without reference to a setting retaining the potential to benefit other libraries disciple of retaining existing in sober university libraries. Use the survey method and adopted a questionnaire distributed to the research sample consisting of employees working in the libraries in question and the total number of forms that have been distributed (50) form .tousel search phrase conclusions from them .
1-The lack of authority control depends on it to find a
... Show MoreBased economic units to technology to add innovations that lead to contribute to customer satisfaction, under intense competition and rapid development in customer taste, the economic units tend to apply the concepts that contribute to customer satisfaction led by the introduction of artificial intelligence techniques. In the production prominent role in the contributing and responding to the rapid changes in customer tastes, and consequent impact this in achieving customer satisfaction. Search gained importance of relying on artificial intelligence techniques to achieve customer satisfaction through speed of response to changes in the tastes of customers and thus be able to increase its market share، and sales growth، and to achieve a
... Show MoreThe research aims to identify how to enhance the quality of the human resources, focusing on four dimensions (efficiency, effectiveness, flexibility, and reliability), by adopting an adventure learning method that combines theoretical and applied aspects at the same time, when developing human resources and is applied using information technology, and that Through its dimensions, which are (cooperation, interaction, communication, and understanding), as the research problem indicated a clear deficiency in the cognitive perception of the mechanism of employing adventure learning dimensions in enhancing human resources quality, so the importance of research was to present treatments and proposals to reduce this problem. To achieve
... Show MoreThe presence and absence binary is an essential part of and a motivation for the direction vision which depends on the principle that the components of the theatre performance move in contrast with each other; one is directly informative which is the presence relations and the other is structural that is identical to the absence relations. The first is material band visual that evokes the incorporeal mental absent. Hence, the present study(Presence and Absence in the Iraqi Theatre Performance :Summer's Rain Play as an Example) aims at explaining those relations and their transformations between presence and absence in the performance