Preferred Language
Articles
/
jcolang-638
The composition of the vocabulary and passages in the poems of Saadi: بررسی ترکیب‌ سازی در قصاید و قطعات سعدی
...Show More Authors

The importance of research and study of classical Persian literature is not overlooked.  So far, there have been many studies in this area.  But there are still some things that need more research.  Persian grammar is one of the most important branches of Persian literature.  This section has always been converted at different times.  One of the issues that has been neglected in the studies of classical literature is the study of the technical tales of past and past poetry.  These texts can be studied from different perspectives.  Because Persian is a mixed language, it is possible to combine language terms with each other or to add prefixes and suffixes to express new concepts. They can be used by examining nonlinear terms (derivative, compound, derivative) in the past,  And used it to form new words.

         Saadi Shirazi has created valuable works in the field of Persian language and literature. Many scholars have tried to examine his works from different points of view.  At the same time, sheikhs and cuttings were taken lightly.  In this paper, the author attempted to study the composition of sati and parts.

     اهمیت تحقیق و پژوهش و واکاوی متون کلاسیک ادبیات فارسی بر کسی پوشیده نیست. تا کنون پژوهش های زیادی در این زمینه صورت گرفته است. ولی هنوز مواردی را نمى توان  یافت که بررسی بیشتر درباره ی آنها ضروری به نظر می رسد. دستور زبان فارسی یکی از شاخه های مهم زبان فارسی است. این شاخه در ادوار مختلف همواره دستخوش تحول و دگرگونی بوده است. یکی از مواردی که در پژوهش های مربوط به ادب کلاسیک کمتر مورد توجه قرار گرفته است  بررسی مباحث دستوری متون منظوم و منثور گذشته می باشد. این متون را می توان از نظرگاه های مختلف دستوری مورد مطالعه و مداقّه قرار داد. از آن جا که زبان فارسی زبانی ترکیبی است ؛ یعنی می توان از پیوستن واژه های زبان به یکدیگر یا افزودن پیشوندها و پسوندها به آن برای بیان مفاهیم تازه بهره گرفت ، می توان با بررسی واژه های غیر بسیط ( مشتق ، مرکب و مشتق ـ مرکب ) در آثار گذشتگان ، الگوی ساختواژه را از آنها استخراج کرد و در ساختن واژه های جدید از آن ها بهره برد.

سعدی شیرازی آثار ارزشمندی را در حوزه ی زبان و ادبیات فارسی خلق کرده است .پژوهشگران بسیاری

کوشیده اند تا آثار او را از دیدگاه های مختلف بررسی کنند. نگارنده در این مقاله کوشیده است تا به بررسی ترکیب‌سازی در قصاید و قطعات سعدی بپردازد.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 20 2024
Journal Name
Fizjoterapia Polska
Development Artificial Neural Network (ANN) computing model to analyses men's 100¬meter sprint performance trends
...Show More Authors

Coaches and analysts face a significant challenge of inaccurate estimation when analyzing Men's 100 Meter Sprint Performance, particularly when there is limited data available. This necessitates the use of modern technologies to address the problem of inaccurate estimation. Unfortunately, current methods used to estimate Men's 100 Meter Sprint Performance indexes in Iraq are ineffective, highlighting the need to adopt new and advanced technologies that are fast, accurate, and flexible. Therefore, the objective of this study was to utilize an advanced method known as artificial neural networks to estimate four key indexes: Accelerate First of 10 meters, Speed Rate, Time First of 10 meters, and Reaction Time. The application of artifi

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Diagnosing Pilgrimage Common Diseases by Interactive Multimedia Courseware
...Show More Authors

In this study, we attempt to provide healthcare service to the pilgrims. This study describes how a multimedia courseware can be used in making the pilgrims aware of the common diseases that are present in Saudi Arabia during the pilgrimage. The multimedia courseware will also be used in providing some information about the symptoms of these diseases, and how each of them can be treated. The multimedia courseware contains a virtual representation of a hospital, some videos of actual cases of patients, and authentic learning activities intended to enhance health competencies during the pilgrimage. An examination of the courseware was conducted so as to study the manner in which the elements of the courseware are applied in real-time learn

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Detecting Textual Propaganda Using Machine Learning Techniques
...Show More Authors

Social Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation.  Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annota

... Show More
View Publication Preview PDF
Scopus (21)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Tikrit University For Humanities
ثورات الأندلسيين بعد تسليم مدينة غرناطة دراسة تاريخية للأسباب والنتائج
...Show More Authors

الكتابة عن الأندلس بعد تسليم مدينة غرناطة يحمل في ثناياه ألم كبير، لأن الأندلسيين عاشوا تجربة إنسانية قاسية سببها الأساس غياب التسامح الديني والعدالة الاجتماعية، الأمر الذي دفعهم للثورة مطالبين بحقوقهم التي نصت عليها معاهدة تسليم المدينة. فقد  عاش أولئك حياة صعبة ، فكانوا صورة  للصراع  بين حضارتين  الإسلامية والغربية ،  ويمكن تلمس ذلك الصراع من خلال دراسة ثوراتهم ضد السلطة الحاكمة التي يبدو من تتبع أح

... Show More
View Publication
Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
An Algorithm for nth Order Intgro-Differential Equations by Using Hermite Wavelets Functions
...Show More Authors

In this paper, the construction of Hermite wavelets functions and their operational matrix of integration is presented. The Hermite wavelets method is applied to solve nth order Volterra integro diferential equations (VIDE) by expanding the unknown functions, as series in terms of Hermite wavelets with unknown coefficients. Finally, two examples are given

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 30 2024
Journal Name
حوليات أداب عين شمس
المنظور الزمني وعلاقته بجودة الحياة الاكاديمية لدى طلبة جامعة بغداد
...Show More Authors

Abstract The aim of the current research is to identify the time perspective and the quality of academic life of Baghdad University students. The research also aims to identify the relationship between the time perspective and the academic quality of Baghdad University students and the extent to which the time perspective dimension of academic quality contributes to the identification of the difference between the time perspectives in terms of gender. Finally, the research aims to identify if there is a significant difference in the quality of academic life between males and females. The scales were applied to a number of (434) university male and female student. A one-sample t-test, a two-sample t-test, the analysis of the variation, the P

... Show More
View Publication
Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Data Mining Techniques for Iraqi Biochemical Dataset Analysis
...Show More Authors

This research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Al-kindy College Medical Journal
Viable Strategies to Increase Clinical Trial Patient Diversity
...Show More Authors

In the United States, the pharmaceutical industry is actively devising strategies to improve the diversity of clinical trial participants. These efforts stem from a plethora of evidence indicating that various ethnic groups respond differently to a given treatment. Thus, increasing the diversity of trial participants would not only provide more robust and representative trial data but also lead to safer and more effective therapies. Further diversifying trial participants appear straightforward, but it is a complex process requiring feedback from multiple stakeholders such as pharmaceutical sponsors, regulators, community leaders, and research sites. Therefore, the objective of this paper is to describe three viable strategies that can p

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Sep 25 2025
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More