This research work considers one of the authentic and most modern modes of storytelling, as employed by Garcia Marquez in one of his famous stories "An Old ManWith Enormous Wings" (1972). Technically, the work is divided into four parts: the first serves as an introduction to his literary works, his use of magic realism, and addresses mainly the interests of Arab readers; the second handles the development of modern short story through the perspective of realism, until the emergence of magic realism as a new style; the third deals with the origin, nature and development of this style, and his mastery of it; the fourth part tries to analyze the story and its plot, thoughts, characters, symbols and metaphors, in the light of the artistic principles presented in the first three parts.There is a concluding word at the end that tries to indicate the contribution of Garcia Marquez to the art of narration through his use of magic realism in the story of "An Old Man With Enormous Wings".
This research aims to explore the impact of strategic intelligence by his dimensions (Foresight , system thinking, vision, motivation and partnership) on decision making styles which represented by ( rational, intuitive, dependent, Spontaneous and Avoidant style) for a sample of the administrative leaders in the center of Reconstruction &Housing Ministry and Some its formations which are companies of (Sa'ad, Al Mansour, al Farouq, Assyria, al-Mu'tasim, al- Rasheed, and Public Authority for Housing). So to achieve the research objectives and to test hypotheses, it has been relying
... Show MoreEuphemisms are advantageous in people’s social life by turning sensitive into a more acceptable ones so that resentful feelings and embarrassment can be avoided. This study investigates the ability of Iraqi English learners in using euphemistic expressions, meanwhile, raising their awareness and the faculty members in English teaching faculties regarding the relevance of discussing the topics that demand euphemisation. This study comprised three stages: initial test, explicit instruction with activities, and a final test for the students’ development in this domain. A test has been distributed among 50 respondents, who are at the fourth year of their undergraduate study at the University of Babylon/ College of Basic Education. The lo
... Show MoreThis research studies the possibility of producing Bone China with available local and geological substitutes and other manufactured ones since it’s traditionally produced by Bone ash, Cornish stone, and China clay, while the substitutes are Kaolin instead of China clay and Feldspar potash instead of Cornish stone. Because of the unavailability of Feldspar in Iraq, it was substituted with the manufactured alternative Feldspar. Bone ash was prepared from cow bones with heating treatments, grinding and sifting. The alternative Feldspar was prepared by chemical analysis of the natural Feldspar potash with local materials that include Dwaikhla Kaolin, Urdhuma Silica sand, Potassium Carbonate, and Sodium Carbonate. The mixture was burned at
... Show MoreThe problem of research lies in answering some of the question: What is the reality of (vital conscience) in some colleges and departments of physical education and sports science in Baghdad from the viewpoint of the teachers? And The aim of the research is to prepare a scale (the vitality of the conscience) and learn about its reality in colleges and departments of physical education and sports science in Baghdad from the viewpoint of teachers and The researcher relied on the descriptive method in the survey method and the relationships related to the nature of the research problem and The sample of the research was senior administrators teaching some colleges and departments of physical education and sports science in Baghdad , Th
... Show MoreIn this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreIn this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
This paper proposes a new strategy to enhance the performance and accuracy of the Spiral dynamic algorithm (SDA) for use in solving real-world problems by hybridizing the SDA with the Bacterial Foraging optimization algorithm (BFA). The dynamic step size of SDA makes it a useful exploitation approach. However, it has limited exploration throughout the diversification phase, which results in getting trapped at local optima. The optimal initialization position for the SDA algorithm has been determined with the help of the chemotactic strategy of the BFA optimization algorithm, which has been utilized to improve the exploration approach of the SDA. The proposed Hybrid Adaptive Spiral Dynamic Bacterial Foraging (HASDBF)
... Show MoreRemote surveying of unknown bound geometries, such as the mapping of underground water supplies and tunnels, remains a challenging task. The obstacles and absorption in media make the long-distance telecommunication and localization process inefficient due to mobile sensors’ power limitations. This work develops a new short-range sequential localization approach to reduce the required amount of signal transmission power. The developed algorithm is based on a sequential localization process that can utilize a multitude of randomly distributed wireless sensors while only employing several anchors in the process. Time delay elliptic and frequency range techniques are employed in developing the proposed algebraic closed-form solution.
... Show MoreThe ultimate goal of any sale contract is to maximize the combined returns of the parties, knowing that these returns are not realized (in long-term contracts) except in the final stages of the contract. Therefore, this requires the parties to the contract to leave some elements open, including the price, because the adoption of a fixed price and inflexible will not be appropriate to meet their desires when contracting, especially with ignorance of matters beyond their will and may affect the market conditions, and the possibility of modifying the fixed price through The elimination is very limited, especially when the parties to the contract are equally in terms of economic strength. Hence, in order to respond to market uncertainties, the
... Show More