The problem of rebellion is considered one of the features of rapid changes that a society undergoes in all spheres and directions of life, especially in the realm of social relations, customs, traditions, values, and principles. Rebellion may manifest itself in rebellion against oneself, against values or traditions, or against social or governmental authority. One may find that submission plays a vital role in all of these interactions. This study deals with the problem of rebellion in the works of two renowned authors: The French Gustave Flaubert and the Israeli Amos Oz, through two main characters who share similar qualities and traits. Emma Bovary and Henna Konin demonstrate this through their rebellion against themselves, their relationship with society and family, and their relationship with customs and traditions. They appeared in manifestations of rebellion at times and submission at others. Rebellion and submission also emerged through the two authors’ relationship. It seems that the two authors' connection in the rebellion issue was characterized by behavioral and psychological issues, which resulted from physiological and psychological changes that influenced their conduct and gave rise to severe psychological difficulties. They felt lost and alienated because they were unable to face them. As a result, they rebelled against traditions, values, and practices, which in turn led to unacceptable aggressive tendencies. This, in turn, led to the two characters’ tendency towards rebellion and revolution against authority, whether that of the family or society in general. תקציר בעיית המרד היא טבעם של השינויים המהירים שעוברים על החברה בכל תחומי החיים וכיווניהם, במיוחד בתחום היחסים החברתיים, המנהגים, המסורות, הערכים והעקרונות וכו'. מרד יכול להתבטא כמרד עצמי, מרד נגד מנהגים, מרד נגד עקרונות ונורמות, או מרד נגד כוח פוליטי או חברתי. אנו עשויים למצוא כניעה לקחת מקום חשוב בכל מערכות היחסים האלה. במחקר זה נתייחס לתופעה של מרד בקרב שני סופרים בולטים, גוסטב פלובר הצרפתי ועמוס עוז הישראלי. דרך שתי גיבורות שחלקו את אותן תכונות ומאפיינים. הגיבורות "אמה בובארי וחנה גונין" הראו זאת באמצעות המרד העצמי שלהן כדי להוכיח את קיומן, באמצעות מערכת היחסים שלהן עם החברה והמשפחה, וגם מרדו נגד מנהגים ומסורות. הן היו בצורה הגדולה ביותר של מרד, וכניעה שוב. מרד וכניעה הופיעו גם באמצעות מערכת היחסים של שני הסופרים עם השלטון. נראה כי הקשר בין שני הסופרים בבעיית המרד נוצר כתוצאה מבעיות פסיכולוגיות והתנהגותיות, בשל השינויים הפיזיולוגיים והפסיכולוגיים שהשפיעו על התנהגותם, מה שהוביל להופעתם של קונפליקטים פסיכולוגיים חמורים. הם לא יכלו להילחם בזה, והם הרגישו מנוכרים ואבודים. כל זה הוביל למרד שלהם נגד ערכים, מנהגים ומסורות. זה מה שאנו יודעים על נטייתם של שתי הגיבורות להתנגד ולמרד, על ידי הצגת נטיות לעצמאות ולמרד נגד השלטון, בין אם זה בסמכותה של המשפחה, או בחברה בכלל.
LED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more e
... Show MoreFeedback on students’ assignments can be done in many different ways. Nowadays, the growing number of students at universities has increased the burden on the instructors to give feedback on students’ writings quickly and efficiently. As such, new methods of modern online automated feedback tools, such as Hemingway app and ecree,are used to assist and help instructors. Hence, this research is an explanatory study to examine the effect of using the online automated feedback on some Iraqi EFL learners’ writings at the university level. The study comprised 60 students enrolled in an English language course at the University of Anbar. They were divided randomly into two groups, experi
... Show MoreIn this research, beam expander, BEX, is explained and designed for illuminating the
remote flying target. The BEX is optically designed to be suited for Nd:YAG laser of given
specifications. The BEX is modified to be zoom one to meet the conditions of preventing the
receiving unit; i.e the photodetector, from getting saturated at near and far laser tracking.
Decollimation could be achieved by automatic motor, which controls zoom lens of the BEX
according to the required expansion ratio of beam expander
Background: Lateral sinus augmentation and simultaneous insertion of dental implants is a highlypredictable procedure and associated with high rate of implants success.Aims: To evaluate implant stability changes following maxillary sinus augmentation utilizing deproteinizedbovine bone alone or mixed with platelet-rich fibrin.Materials and Methods: A total of 34 lateral sinus augmentation procedures were performed and 50 dentalimplants simultaneously installed. The lateral sinus augmentation cases were allocated randomly into 3groups: Group A comprised 13 procedures and 21 dental implants utilizing solely deproteinized bovine bone.Group B involved 10 cases and 16 dental implants using deproteinized bovine bone mixed with leukocyteand
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreThe insulation system of a machine coil includes several layers made of materials with different characteristics. The effective insulation design of machine coils, especially in the machine end winding, depends upon an accurate model of the stress grading system. This paper proposes a modeling approach to predict the transient overvoltage, electric field, and heat generation in machine coils with a stress grading system, considering the variation of physical properties in the insulation layers. A non-uniform line model is used to divide the coil in different segments based on material properties and lengths: overhang, stress grading and slot. The cascaded connection of chain matrices is used to connect segments for the representation of the
... Show MoreThe aim of the research is to design a test with cognitive achievement through the use of the inverted class strategy for some basic soccer skills for gyms for first-average students, within the curriculum of the Ministry of Education, where the researcher used the experimental approach. For the same division (B) and the number of each group (10) students, i.e. the total total of the research sample (20) students, and the pre-test for the research sample was applied through the design of the test prepared by the research after which the educational program with the strategy was applied to the research sample and continued (8) weeks after Completion of the tutorial has been post-tested for the research sample, In it, he reached significant r
... Show More