Dans le roman moderne, le type du héros est depuis longtemps devenu suspect. Il risque même de disparaitre dans ce qu´on désigne le Nouveau Roman qui, se concentrant plutôt sur les objets, décrits minutieusement, refuse la fonction épistémologique traditionnelle de la littérature. Cette conception se manifeste, sur le plan formel, par certains traits typiques, comme la relativisation des points de vue, la décomposition de l´action, la destruction du temps, la décomposition de l´espace et la désintégration du personnage romanesque dont les liens avec la société sont coupés.
تشير الادبيات الى ان العنف قد رافق الانسان منذ بدء الخليقة حتى يومنا هذا، الا ان التطور العلمي والتكنلوجي والسرعة الفائقة في التغيير قد زاد من حجمه، وعدد مثيراته واختلفت نوعيته تبعاً لارتقاء الانسان ( العكيلي، 2000، ص91).
يتسم القرن الحادي والعشرين بظاهرة العنف بشكل عام، حيث لم تسلم منطقة منه، وهذا لا يمثل تهديداً لمنجزات الانسان المادية والاجتماعية فقط، ولكنه يمتد نحو الانسان ذاته. وسلوك الع
... Show Moreيتناول البحث شخصية شعرية وأدبية فذة هو محمد صالح بحر العلوم الشاعر العراقي المعروف والمولود في بيت ثوري من بيوتات النجف المعادية للاستعمار البريطاني في مطلع القرن العشرين، وينحدر من أسرة عريقة مشهورة بالعلم والأدب، عاش بحر العلوم شاعراً ينقل بصوره الجمالية كل ما يقع في حواسه، وتجربته تثري من اتصاله ببيئته فنجد الشاعر اشبه بالمصور يستمد صوره من واقع بيئته المتنوع. ونحن في بحثنا هذا نحاول أن نرصد أهم المصادر
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreIn life in general and in the press, especially the success of a particular message depends heavily shipments carried by, and images idyllic suggestive, how many meanings that reaching an audience, and is the magazines and one of those media that target a broad audience, trying to please Him and the acquisition of his attention through a form of aesthetic granted pleasure and satisfaction from this point of view, read image ad as Date pure incident of everyday life, and here was placed this research about the aesthetic image advertising in the covers of women's magazines, which has been briefing them through the Four Seasons included in the search, was the first chapter Batarh systematic talked about problem Find the placing on the form
... Show MoreMany people, especially among the youth or scholars, wonder about the position of Islam or the scholars of faith on the terminology used by scholars of theology in a certain period of time, and then circulated by people throughout the times and to the present day, such as the terms (the old, the maker, the updated, the cause and the cause) and so on, and this What I felt myself while teaching this subject from some of the students, some of whom consider it blasphemy, and some of them consider it an innovation of speech, and so there were many questions about this subject, which led me to write and research it, after relying on God Almighty, although the research is not long due to the nature of This topic on the one hand, and because I d
... Show Moreاستهدفت الدراسة الكشف عن العلاقة بين نوعين من الدوافع و الجنس و العمر, تكونت العينة من (132) من طلبة الجامعة . (75) من الاناث و (57) من الذكور من الذين تراوحت اعمارهم مابين (18-26) سنة . استجاب الطلبة الى قائمة الدوافع ما بين الاشخاص المرتبطة بالنزوع الى الاعتداء ، كان قد قيس بها الغفران ، و قد توصل البحث الى النتائج الاتية : اشارت النتائج الى انه توجد فروقا ذات دلالة احصائية بين الجنسين في دافع الانتقام و لكن ليس
... Show MoreImage segmentation can be defined as a cutting or segmenting process of the digital image into many useful points which are called segmentation, that includes image elements contribute with certain attributes different form Pixel that constitute other parts. Two phases were followed in image processing by the researcher in this paper. At the beginning, pre-processing image on images was made before the segmentation process through statistical confidence intervals that can be used for estimate of unknown remarks suggested by Acho & Buenestado in 2018. Then, the second phase includes image segmentation process by using "Bernsen's Thresholding Technique" in the first phase. The researcher drew a conclusion that in case of utilizing
... Show MoreThis paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show More