War as a human phenomenon, has its own literature. Poetry is a major genre in this literature. This paper is an attempt to investigate and analyse some stylistic features in two selected, English and Arabic, war poems. These poems share the same theme.Both promote the principle of sacrificing one’s own life for the sake of homeland. This paper limits itself to analyse, thecontent words, tenses, semantic grouping of vocabulary and foregrounding in the two poems. The areas of analysis show great similarities in distributing the general content words (nouns, verbs, adjectives, and adverbs). In the analysis of the semantic areas of each content word, these poems reveal some similarities and some differences in their frequency rates. The poets, in both poems, resort to the present tense to express their thoughts.Bothpoems demonstrate foregrounding, though in different degrees, in using repetition, deviation and parallelism.The sole significant difference is in the frequency use of adjectives, which is higher in the English poem than in the Arabic poem.
The article is devoted to the Russian-Arabic translation, a particular theory of which has not been developed in domestic translation studies to the extent that the mechanisms of translation from and into European languages are described. In this regard, as well as with the growing volumes of Russian-Arabic translation, the issues of this private theory of translation require significant additions and new approaches. The authors set the task of determining the means of translation (cognitive and mental operations and language transformations) that contribute to the achievement of the most equivalent correspondences of such typologically different languages as Russian and Arabic. The work summarizes and analyzes the accumulated exper
... Show MoreThe research included four topics: the definition of Imam al-Bazzazi, his scientific life, his sheikhs, his students, his writings, his death, and selected issues of his weight in the book of prayer. The Imam al-Bazazi is the son of Muhammad ibnShihabibn Yusuf. He is known as al-Khardizi al-Khawarizmi. The author did not adopt the definitions of language and terminology, and rarely mention the legal evidence adopted by the scholars in their opinions, and only to mention the views only, and the author, may God have mercy on him in his book on the sources of m The Prophet (peace and blessings of Allaah be upon him) said: "The Prophet (peace and blessings of Allaah be upon him) And fall down the order, the third issue, which is to leave the
... Show MoreIn this paper, a new analytical method is introduced to find the general solution of linear partial differential equations. In this method, each Laplace transform (LT) and Sumudu transform (ST) is used independently along with canonical coordinates. The strength of this method is that it is easy to implement and does not require initial conditions.
Modal verbs are also called auxiliary verbs, helping verbs and modal auxiliaries. They are special auxiliary verbs that express the degree /of certainty of the action in the sentence, attitude or opinion of the writer concerning the action. These auxiliary verbs are can, could ,may, might, must, ought to, shall, should, will, would and had better. Modality is one of the most difficult aspects of learning English, because the form of modals does not follow the conventional rules of grammar, and there are so many meanings of modals that students often get confused about which modal to use. Also, many EFL learners face difficulty in choosing the proper modal verb that fit certain situations because each modal verb has many functions. The pr
... Show MoreThe challenge in studying fusion reaction when the projectile is neutron or proton rich halo nuclei is the coupling mechanism between the elastic and the breakup channel, therefore the motivation from the present calculations is to estimate the best coupling parameter to introduce the effect of coupled-channels for the calculations of the total cross section of the fusion , the barrier distribution of the fusion and the average angular momentum 〈L〉 for the systems 6He+206Pb, 8B+28Si, 11Be+209Bi, 17F+208Pb, 6He+238U, 8He+197Au and 15C+232Th using quantum mechanical approach. A
... Show MoreThe challenge in studying fusion reaction when the projectile is neutron or proton rich halo nuclei is the coupling mechanism between the elastic and the breakup channel, therefore the motivation from the present calculations is to estimate the best coupling parameter to introduce the effect of coupled-channels for the calculations of the total cross section of the fusion , the barrier distribution of the fusion and the average angular momentum 〈L〉 for the systems 6He+206Pb, 8B+28Si, 11Be+209Bi, 17F+208Pb, 6He+238U, 8He+197Au and 15C+232Th using quantum mechanical approach. A quantum Coupled-Channel Calculations are performed using CC code. The predictions of quantum mechanical approach are comparable with the measured data that is
... Show MoreVitamin D is a fat-soluble vitamin with antioxidant and DNA protecting properties , Levofloxacin is a member of the fluoroquinolone drug class, Its broad-spectrum bactericidal effect affects both Gram-positive and Gram-negative bacteria.
The goal of the study is to analyze the haematology analysis in rats received levofloxacin and show the preventive impact of vitamin D3 by analyzing the haematology parameters: packed cell volume (PCV), mean corpuscular hemoglobin concentration(MCHC),haemoglobin (HB), red blood cell (RBC), mean corpuscular volume (MCV),meancorpuscular haemoglobin(MCH), WBC ,differential WBC, and Platelets.
The study included 42 rats divided into 6 groups each group 7 rats. group I negative control
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More