تهدف هذه الدراسة إلى بحث ظاهرة الاغتراب في رواية " ديك الفداء " لايلي عامير ، لأن هذه الظاهرة تبدو أكثر وضوحا في هذه الرواية ، وتمثل تیارا مسيطرة على معطياتها واتجاهاتها الفكرية والفنية، خاصة أن الكاتب استطاع أن يجسد هذه الظاهرة المحورية تجسيدا فنيا متميزا ، وكشف عن طبيعة العلاقة بين عالم الواقع وعالم الحلم لدى الشخصيات، وعما تتسم به من تناقض و تعارض وتصادم و شعور بالإحباط والضياع والاغتراب. وقد اشتملت الدراسة على المحاور التالية : واقع عامير وظروف حياته . مفهوم الاغتراب . الاغتراب في الأدب الروائي . المعطيات الفكرية في الرواية . مظاهر الاغتراب في الرواية . التقنيات السردية ودورها في إبراز تجربة الاغتراب .
Praise be to God, Lord of the worlds, and prayers and peace be upon our master and beloved Muhammad, the wise guide and great teacher, the guide to a straight path, the one sent as a mercy to the worlds, and upon his good and chosen family, his chosen companions, the working scholars, and those who follow them in righteousness until the Day of Judgment.
And after:
One of the important controversial topics shared between the sciences of the Noble Hadith and the Fundamentals of God is the issue of the innovator in terms of accepting and rejecting his narration and testimony, and the difference in it leads to disagreement in many branches of jurisprudence that were based on texts narrated by innovated narrators or those accu
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreColorectal cancer (CRC) is the most common gastrointestinal malignancy and one of the top ten common cancers worldwide with approximately 2 million cases. There are multiple risk factors that could lead to CRC emergence; of which are genetic polymorphisms. Excision repair cross-complementing group 2 (ERCC2) gene encodes for ERCC2 enzyme which plays a crucial role in maintaining genomic integrity by removing DNA adducts. Several studies suggested that there could be a link between genetic polymorphisms of ERCC2 gene and the risk of CRC development. Hence the present study aims to validate the relationship between the following ERCC2 single nucleotide polymorphisms (rs13181, rs149943175, rs530662943, and rs1799790) and CRC susceptibility. A t
... Show MoreRetained soft tissue foreign bodies following injuries are frequently seen in the Emergency and Plastic Surgery practice. The patients with such presentations require a watchful and detailed clinical as- sessment to overcome the anticipant possibility of missing them. However, the diagnosis based on the clinical evaluation is usually challenging and needs to be supported by imaging modalities that are suboptimal and may fail in identifying some types of foreign bodies. Owing to that, serious complications such as chronic pain, infection, and delayed wound healing can be faced that necessitate a prompt intervention to halt those detrimental consequences. The classical method of removal is a surgical exploration which is not free of risks.
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe article considers the main reason for A. I. Herzen's address to obsolete words, which is their ability to acquire a stylistic coloring in the context of speech, as well as the possibility of combining, in some cases, with neutral lexemes of various functional styles. A certain stylistic effect of such characteristics of this type of vocabulary is represented, as a result of which their stylistic coloring in syntagmatic terms does not coincide with stylistic coloring in terms of paradigmatics, that is, in speech they have a completely stylistic meaning. Attention is focused on the role of outdated vocabulary, which consists in the fact that they serve to implement such features of the artistic style as imagery, emotionality, and their
... Show MoreIn the current study, new derivatives were synthesized by reaction of N-hydroxyphthalimide with chloro acetyl chloride in the presence of Et3N as a base to form 1,3-dioxoisoindolin-2-yl 2-chloroacetate (B1), which in turn enters several reactions with different amines where it interacts with primary amines to give 1,3-dioxoisoindolin-2-yl acetate derivatives (B2-B4) in basic medium, in the same way it interacts with these amines but with adding KNCS to form thiourea derivatives (B5-B7). It also reacts with diamines to give bis(azanediyl) derivatives (compounds B8-B10). The prepared derivatives were diagnosed using infrared FTIR and 1HNMR,13CNMR for some derivatives. Compounds B4, B5 and B9 were measured as corrosion inhibitors the inhibitio
... Show More