This paper aims at investigating the effect of postmodernism and technology on the social life in Don Delillo's novel The White Noise. In this novel, Don Delillo portrays the chaotic life by using modern technology which has been presented by three ways. The first way is by television as being a source of information and entertainment. The second way is by the toxic event whereas the third is by Dylar's episode and its destructive consequences. He depicts that through the atmosphere of Jack's family plus its effects on the life and thoughts of the elders and society. He proves that technology is leading humanity not to safety, but to death. He further highlights that by showing the impact of technology on the life of the main characters in his novel The White Noise.
The purpose of this paper is to model and forecast the white oil during the period (2012-2019) using volatility GARCH-class. After showing that squared returns of white oil have a significant long memory in the volatility, the return series based on fractional GARCH models are estimated and forecasted for the mean and volatility by quasi maximum likelihood QML as a traditional method. While the competition includes machine learning approaches using Support Vector Regression (SVR). Results showed that the best appropriate model among many other models to forecast the volatility, depending on the lowest value of Akaike information criterion and Schwartz information criterion, also the parameters must be significant. In addition, the residuals
... Show MoreBackground: White spot lesions (WSLs) are subsurface enamel demineralization manifested as white opacities which had an esthetic problem. The purpose of this in-vitro study was to evaluate the lesion depth improvement of WSLs following application of fluoride varnish, tooth mousse and resin infiltration (ICON). Materials and methods: Artificial WSLs were created on 120 premolar teeth using demineralization solution with pH (4-4.5). Samples randomly allocated into four groups; fluoride varnish, tooth mousse, ICON and untreated group. Groups were discolored in Cola and orange juice for 24 hours. Teeth were ground sectioned by longitudinal cutting then these sections examined and photographed under stereomicroscope at 12X magnification then an
... Show MoreDynamic Thermal Management (DTM) emerged as a solution to address the reliability challenges with thermal hotspots and unbalanced temperatures. DTM efficiency is highly affected by the accuracy of the temperature information presented to the DTM manager. This work aims to investigate the effect of inaccuracy caused by the deep sub-micron (DSM) noise during the transmission of temperature information to the manager on DTM efficiency. A simulation framework has been developed and results show up to 38% DTM performance degradation and 18% unattended cycles in emergency temperature under DSM noise. The finding highlights the importance of further research in providing reliable on-chip data transmission in DTM application.
Most of the cinema and television production relies on the use of modern digital technologies, which today become the as ideal as the artistic expressive style that sends aesthetic values through the use of electronic elements of the language of cinema and television to achieve aesthetic dazzling, and design the digital production for the purpose of persuasion, as well as the use of digital effects and graphics to activate the aesthetic pleasure. The research tries to subject all these aspetcs to study and apply them to a modern sample in order to get the results that confirm this technical and artistic aesthetic synergy that leads to the emergence of a cinema and television achievement the leas
... Show MoreResearching the effects of the research and technological development contract, determining its extent and demarcating the boundaries of the obligations imposed in it, is the cornerstone of economic growth and development, because defining these obligations removes the ambiguity and conflict between interests, by stating the rights owed to each party and even trying to reconcile them, or impose protection by specifying guarantees that are compatible with the essence of the R&D contract, For the purpose of studying the subject thoroughly, we will divide this research into two sections. The first is devoted to identifying the parties to the research and technological development contract. As for the other topic, we will explain the obligation
... Show MoreThis study was aime to investigate the effect of addition different concentration of celery leaves to white soft cheese ,Treated cheese between 2018-2019, ,The finely Celery (Apium graveolens) leaves were adding to crude white cheese after texturizing in three leveles included (A,B,C) in addition of control antimicrobial activity of celery treated cheese against total account bacteria and coliform bacteria was estimated during (0, 5, 10, 15, 20) days. The results were shown that the higher concentration of celery in treated cheese, had a lower concentration of protein, lipid and ash content ( 16.81,15.13 and 4.30% respectively, but it had a higher moisture content 59.50%.also the total bacteria counts were decreasing significantly (0.05 P)w
... Show MoreIn this paper the behavior of the quality of the gradient that implemented on an image as a function of noise error is presented. The cross correlation coefficient (ccc) between the derivative of the original image before and after introducing noise error shows dramatic decline compared with the corresponding images before taking derivatives. Mathematical equations have been constructed to control the relation between (ccc) and the noise parameter.
The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show More