The Quiet American could be considered as one of Graham Greene’s most distinguished books; it is an epochal novel written during the phase of the cold war between the United States and the Soviet Union. The novel deals with the interference of the United States in Vietnam ten years before Vietnam’s war. The role the Americans played in arousing an inner political crisis in the country previous to her military invention. The book reflects that this action was not out of American government concern about Vietnamese people themselves but merely a political foreign affair. They wanted to stop communism from spreading widely and reducing its role in the East. This paper attempts to analyse the novel concentrating on the message Greene intended through unveiling that historical fact. Meanwhile it displays the varied Americans responses to the text and how particular responses twisted the genuine intention of the author. The researcher also scrutinizes the text to expose Washington decision makers’ policy in dealing with third world countries. Their devious inclination of achieving freedom and bringing democracy for those suffering nations which eventually turns to nothing except death and destruction.
In this research, we tackled the idea of absence and what companies it of interpretations and human, textual, philosophical and explanatory concerns. We also tackled the features and drawing them and identifying and lighting them by Ali Abdunnabi Az-Zaidi and how he read them as an Iraqi who writes in order to express a social, intellectual, political and religious reality in some of its aspects. The idea of absence and what accompanies it of pain or heartbreak or human change was a rich subject for all the writers and authors in the Iraqi theatre, and Ali Abdunnabi Az-Zaidi was one of them and the closest and most affected by it, who deserves discussion, explanation and briefing. The research problem was looking for the nature of absenc
... Show MoreWhen exercising their authority in the jurisprudence, judges are subject to a set of restrictions that they must adhere to, as they do not want their jurisprudence to be accepted and welcomed by law practitioners in general, and legal scholars in particular, and in contrast to it, the arrows of criticism and defamation will extend to that jurisprudence, and then they will have to reverse them . Perhaps the most important of those restrictions imposed on judges is their observance of justice between the parties to the lawsuit through their lack of bias for one of the parties at the expense of the other, in addition to their observance of public order and public morals, as well as their observance of the legal texts that they work under its u
... Show MoreThis research addresses the relevance of men and women and the consequent provisions
such as dowry and alimony ... Of the like, marriage is to organize links masculinity and
femininity any sexual meeting between men and women a special system that must be
produces reproduction him and alone, which gets its reproduction in human kind, and has no
family and on the basis of private life is being organized.
The importance of the topic see Islam has urged marriage and forbade celibacy, and ensure
that the Lord of Glory Almighty married subsidy nor the origin of the differences between
men and women in money or workmanship or blue-chip Every Muslim inept any Muslim and
every Muslim efficient for any Muslim.
The impor
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
Estimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre
... Show More