Preferred Language
Articles
/
0RjJOZcBVTCNdQwCkpa0
Rebellious Self - A Reading in Madame Bovary's Character of Flubert and Hanna Konin by Amos Oz - Comparative study: האני המורדת - קריאה בדמותה של מאדאם בובארי של פלובר וחנה גונן של עמוס עוז – מחקר השוואתי
...Show More Authors

The problem of rebellion is considered one of the features of rapid changes that a society undergoes in all spheres and directions of life, especially in the realm of social relations, customs, traditions, values, and principles. Rebellion may manifest itself in rebellion against oneself, against values or traditions, or against social or governmental authority. One may find that submission plays a vital role in all of these interactions. This study deals with the problem of rebellion in the works of two renowned authors: The French Gustave Flaubert and the Israeli Amos Oz, through two main characters who share similar qualities and traits. Emma Bovary and Henna Konin demonstrate this through their rebellion against themselves, their relationship with society and family, and their relationship with customs and traditions. They appeared in manifestations of rebellion at times and submission at others. Rebellion and submission also emerged through the two authors’ relationship. It seems that the two authors' connection in the rebellion issue was characterized by behavioral and psychological issues, which resulted from physiological and psychological changes that influenced their conduct and gave rise to severe psychological difficulties. They felt lost and alienated because they were unable to face them. As a result, they rebelled against traditions, values, and practices, which in turn led to unacceptable aggressive tendencies. This, in turn, led to the two characters’ tendency towards rebellion and revolution against authority, whether that of the family or society in general. תקציר בעיית המרד היא טבעם של השינויים המהירים שעוברים על החברה בכל תחומי החיים וכיווניהם, במיוחד בתחום היחסים החברתיים, המנהגים, המסורות, הערכים והעקרונות וכו'. מרד יכול להתבטא כמרד עצמי, מרד נגד מנהגים, מרד נגד עקרונות ונורמות, או מרד נגד כוח פוליטי או חברתי. אנו עשויים למצוא כניעה לקחת מקום חשוב בכל מערכות היחסים האלה. במחקר זה נתייחס לתופעה של מרד בקרב שני סופרים בולטים, גוסטב פלובר הצרפתי ועמוס עוז הישראלי. דרך שתי גיבורות שחלקו את אותן תכונות ומאפיינים. הגיבורות "אמה בובארי וחנה גונין" הראו זאת באמצעות המרד העצמי שלהן כדי להוכיח את קיומן, באמצעות מערכת היחסים שלהן עם החברה והמשפחה, וגם מרדו נגד מנהגים ומסורות. הן היו בצורה הגדולה ביותר של מרד, וכניעה שוב. מרד וכניעה הופיעו גם באמצעות מערכת היחסים של שני הסופרים עם השלטון. נראה כי הקשר בין שני הסופרים בבעיית המרד נוצר כתוצאה מבעיות פסיכולוגיות והתנהגותיות, בשל השינויים הפיזיולוגיים והפסיכולוגיים שהשפיעו על התנהגותם, מה שהוביל להופעתם של קונפליקטים פסיכולוגיים חמורים. הם לא יכלו להילחם בזה, והם הרגישו מנוכרים ואבודים. כל זה הוביל למרד שלהם נגד ערכים, מנהגים ומסורות. זה מה שאנו יודעים על נטייתם של שתי הגיבורות להתנגד ולמרד, על ידי הצגת נטיות לעצמאות ולמרד נגד השלטון, בין אם זה בסמכותה של המשפחה, או בחברה בכלל.

View Publication
Publication Date
Fri Jul 01 2022
Journal Name
Journal Of Oral And Maxillofacial Surgery, Medicine, And Pathology
Rhinocerebral mucormycosis: An Iraqi experience of 16 consecutive cases followed up for up ten years
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Fast lightweight encryption device based on LFSR technique for increasing the speed of LED performance
...Show More Authors

LED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more e

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Sep 27 2020
Journal Name
Journal Of The College Of Education For Women
The Effect of Using Online Automated Feedback on Iraqi EFL Learners’ Writings at University Level
...Show More Authors

Feedback on students’ assignments can be done in many different ways. Nowadays, the growing number of students at universities has increased the burden on the instructors to give feedback on students’ writings quickly and efficiently. As such, new methods of modern online automated feedback tools, such as Hemingway app and ecree,are used to assist and help instructors. Hence, this research is an explanatory study to examine the effect of using the online automated feedback on some Iraqi EFL learners’ writings at the university level. The study comprised 60 students enrolled in an English language course at the University of Anbar. They were divided randomly into two groups, experi

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Dec 05 2017
Journal Name
International Journal Of Science And Research (ijsr)
Multi Response Optimization of Submerged Arc Welding Using Taguchi Fuzzy Logic Based on Utility Theory
...Show More Authors

Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Optical Design of Laser Zoom Beam Expander at near & far Ranges for Tracked Atmospheric Target
...Show More Authors

In this research, beam expander, BEX, is explained and designed for illuminating the
remote flying target. The BEX is optically designed to be suited for Nd:YAG laser of given
specifications. The BEX is modified to be zoom one to meet the conditions of preventing the
receiving unit; i.e the photodetector, from getting saturated at near and far laser tracking.
Decollimation could be achieved by automatic motor, which controls zoom lens of the BEX
according to the required expansion ratio of beam expander

View Publication Preview PDF
Publication Date
Mon Aug 16 2021
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Evaluation of Implant Stability Following Sinus Augmentation Utilizing Bovine Bone Mixed with Platelet-Rich Fibrin
...Show More Authors

Background: Lateral sinus augmentation and simultaneous insertion of dental implants is a highlypredictable procedure and associated with high rate of implants success.Aims: To evaluate implant stability changes following maxillary sinus augmentation utilizing deproteinizedbovine bone alone or mixed with platelet-rich fibrin.Materials and Methods: A total of 34 lateral sinus augmentation procedures were performed and 50 dentalimplants simultaneously installed. The lateral sinus augmentation cases were allocated randomly into 3groups: Group A comprised 13 procedures and 21 dental implants utilizing solely deproteinized bovine bone.Group B involved 10 cases and 16 dental implants using deproteinized bovine bone mixed with leukocyteand

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
Studying the effect of adding buffer gases to CO2 gas on the electron transport parameter
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Electric Power Systems Research
Electromagnetic transient modeling of form-wound stator coils with stress grading system under PWM excitation
...Show More Authors

The insulation system of a machine coil includes several layers made of materials with different characteristics. The effective insulation design of machine coils, especially in the machine end winding, depends upon an accurate model of the stress grading system. This paper proposes a modeling approach to predict the transient overvoltage, electric field, and heat generation in machine coils with a stress grading system, considering the variation of physical properties in the insulation layers. A non-uniform line model is used to divide the coil in different segments based on material properties and lengths: overhang, stress grading and slot. The cascaded connection of chain matrices is used to connect segments for the representation of the

... Show More
Crossref (5)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
مجلة جامعة الانبار للعلوم البدنیة والریاضیة
The effect of the flipped classroom on cognitive achievement Some basic football skills for students
...Show More Authors

The aim of the research is to design a test with cognitive achievement through the use of the inverted class strategy for some basic soccer skills for gyms for first-average students, within the curriculum of the Ministry of Education, where the researcher used the experimental approach. For the same division (B) and the number of each group (10) students, i.e. the total total of the research sample (20) students, and the pre-test for the research sample was applied through the design of the test prepared by the research after which the educational program with the strategy was applied to the research sample and continued (8) weeks after Completion of the tutorial has been post-tested for the research sample, In it, he reached significant r

... Show More
View Publication Preview PDF