Preferred Language
Articles
/
jcois-622
Narrative narration in the poetry of Mohammed Abdul Muttalib   (Top poem as a model)
...Show More Authors

Poets of the age since ancient times to recount the events of their adventures in a fun story style in which the elements of the story of personalities, time and place, and we do not mean this modern art technique (poetic story) as it is now, but was aimed at the pleasures of the other receiving because it is the rule of the quality of literary output, Other times the narrative of events inspired by his broad imagination and this mixing indicates the story's involvement with Arabic poetry to be (poetic story) and this depends entirely on addressing the poet to the recipient, and requires in this narrative to be familiar with the elements of influence and suspense in the other or turned into a monotonous and dull narrative Influential, uninterrupted Communication is free from modern elements such as anticipation, retrieval and surprise, and all this is mixed with metaphorical poetic language and poetic rhythm (internal and external) and all in a distinctive literary context, according to which is a temptation to the recipient and this may have been modern poets great importance, because of her (poetic story) We have chosen the Arab poet (Mohamed Abdel-Muttalib), who is one of the pioneers of the end of the nineteenth century and the beginning of the twentieth century, and this poet was distinguished by its sober style, and the pronunciation of the word , And his broad imagination , All those elements have enabled the poet of his poem which he outlined the wonderful narrative style biography forward systems (Ali Bin Abi Talib, peace be upon him), a poetic story was interesting because of the many influential events. Through this, I sought to analyze the events described by the poet in a literary manner committed to impartiality and objectivity, and this approach showed us the versatility of this poet in this area (poetic story).
In conclusion, the poet shred and creativity in the weaving of events that have gone through a wonderful narrative style and interesting to the other, including the method of modern techniques ..

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Mon Dec 25 2017
Journal Name
Al-khwarizmi Engineering Journal
A new Cumulative Damage Model for Fatigue Life Prediction under Shot Peening Treatment
...Show More Authors

 Abstract

In this paper, fatigue damage accumulation were studied using many methods i.e.Corton-Dalon (CD),Corton-Dalon-Marsh(CDM), new non-linear model and experimental method. The prediction of fatigue lifetimes based on the two classical methods, Corton-Dalon (CD)andCorton-Dalon-Marsh (CDM), are uneconomic and non-conservative respectively. However satisfactory predictions were obtained by applying the proposed non-linear model (present model) for medium carbon steel compared with experimental work. Many shortcomings of the two classical methods are related to their inability to take into account the surface treatment effect as shot peening. It is clear that the new model shows that a much better and cons

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 15 2022
Journal Name
Journal Of Sensors
A Modern Approach towards an Industry 4.0 Model: From Driving Technologies to Management
...Show More Authors

Every so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph

... Show More
View Publication
Scopus (129)
Crossref (107)
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
The House of Illusions A Study in Genet's The Balcony
...Show More Authors

The definition of "prostitute" and prostitution is a difficult one and a
question over which the legislators of many lands and nations differed. A
notable feature of prostitution is its epidemic increase at times of war,
revolution and armed commotion, on account of economic, social and
psychological factors generated by such conditions of mortal conflicts. Wars
invariably deprive young wives and lovers of their men folk, resulting in
financial , sexual and emotional frustrations . At no time is the natural
balance between the sexes more seriously disturbed than during wars, when
thousands of men are thrown into one sector of the country and hundreds of
towns and villages are left to women and children only. Lo

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 17 2016
Journal Name
Al-academy
Encrypted form and content in contemporary designs fabrics and aesthetic implications: زينب عبد علي محسن الزبيدي
...Show More Authors

This research was dealing with the aesthetic impact of encryption in form and content and aesthetic implications in the design of contemporary fabrics. That's where the design of the cloth is linked to the continuous development and continuous innovation and the pursuit of the all-new innovative designs and at the same time an unmarked Cryptographic with semantics and symbols reflect reality aesthetically pleasing and contains four chapters on the research :The first chapter discusses the research problem and its significance is the current quest ( encryption in form and content in contemporary designs fabrics and aesthetic implications ) in that it shows the importance of encryption in the design of fabrics and foundation design configu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
Pharmacokinetic Consideration to Formulate Sustained Release Drugs: Understanding the Controlled Drug Diffusion through the Body Compartment of the Systemic Circulation and Tissue Medium-A Caputo Model
...Show More Authors

The aim of this study is to provide an overview of various models to study drug diffusion for a sustained period into and within the human body. Emphasized the mathematical compartment models using fractional derivative (Caputo model) approach to investigate the change in sustained drug concentration in different compartments of the human body system through the oral route or the intravenous route. Law of mass action, first-order kinetics, and Fick's perfusion principle were used to develop mathematical compartment models representing sustained drug diffusion throughout the human body. To adequately predict the sustained drug diffusion into various compartments of the human body, consider fractional derivative (Caputo model) to investiga

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
CFIA-Turbidimetric and Photometric Determination of Vitamin B9 (Folic acid) Using LEDs as a Source of Irradiation and Two Solar Cells as an Energy Transducer
...Show More Authors

A specific, sensitive and simple method was used for the determination of: vitamin B9 (Folic acid) in pure and pharmaceutical formulations using continuous flow injection analysis. The method is based on formation of ion pair compound between folic acid and ammonium molybdate in an aqueous medium to obtain a gray precipitate complex, using homemade; Ayah-6SX1-ST-2D solar cell CFI Analyzer. Optimum parameters was studied to increase the sensitivity for developed method. The linear range for the calibration graph was 0.01-0.6 mMol.L-1 of vitamin B9 and LOD was 131.994 ng/sample with correlation coefficient ( r ) of 0.9810, RSD% was lower than 0.1%, (n=9) for the determination of vitamin B9 at concentration (0.07and 0.5) mMol.L-1 respectiv

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Crossref
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
Visual Variables in Exterior Advertisements Design Structure: أكرم جرجيس نعمة -عبد الله جاسم غريب
...Show More Authors

  What makes the commercial advertisement distinct is the design structure which is built according to artistic and creative concepts and terms based on the visual and formal interdependence relationships to express the motives of the advertising idea, which is based in its action mechanism on the effective variables, some of which are related to the marketing aspect, and others related to the advertisement aspect. The major aspect is the functional and aesthetic variables, which are represented by the vocabulary of the advertisement area for the open spaces such as the street ads. Its promotional dimension is the active forces in the circulation of commodities and products. Therefore, there would be significant problems the designe

... Show More
View Publication Preview PDF
Crossref