نقدم في هذا البحث تحليل لعملين أدبيين من منظور الحركات الطليعية ثبتت آثارها لدى بعض الكتاب العرب و أمريكا اللاتينية في فترة سنوات العشرينات والألفين. كانت الحياة الخاصة للكاتب ميغيل انخل استورياس تلهمه أنتاج أعمال أدبية، اذ شغل منصب دبلوماسي وحصل على جائزة نوبل غواتيمالاكا. ولد وتوفى في مدينة غواتيملاكا (1974- 1899) يوجد تحول واضح في عمله ذات الشهرة السيد الرئيس(1948) الذي يكسر المعتاد، لأجل مستقبل مكسو بالأفكار الجديدة. استخدمت اللغة، والقواعد والجمل بشكل عنيف لنتائج تخدم المجتمع. ترجم هذا العمل لعدة لغات، واستخدم في السينما والمسرح وكل ذلك لفائدة اجتماعية. تظهر الرواية العناصر السياسية، والاقتصادية، والاجتماعية، كما توجد قلة الرحمة واللاإنسانية واضحة من خلال أحداث الرواية، يحاول الكاتب توضيح ما كان يجري في تلك الفترة. اظهر استورياس الدكتاتور كشخصية غامضة في العمق لا تظهر ويشعر بتأثيرها السيء من كل جانب. مازن عرفة، كاتب سوري الأصل، ولد سنة 1955، و حصل على شهادة الآداب في قسم اللغة الفرنسية من جامعة دمشق، وفيما بعد حصل على الدكتوراه في العلوم الإنسانية، قسم المكاتب، من جامعة ماريا كوري (لوبلين-بولونيا)، حاول من ألمانيا مركز أقامته، أعطاء القراء لمحة عن ما فعلت الدكتاتورية مع أبرياء سوريا الذين أعلنوا الانتفاضة الربيعية، من خلال أنتاجه وهو "الغرانيق" سنة 2017، وذلك للحصول على حقوقهم الشرعية في الحياة. تتكون الرواية من ثلاثة أجزاء: الدكتاتورية، تاريخ سوريه في زمن الانقلاب والانتفاضة. تم نشره في بيروت وحصل على صدى نقد بناء. الغرانيق، هي أنظمة عسكرية جعلت لنفسها أصنام تشبه آلهة، وهذا التشبيه حدث في كثير من البلدان العربية التي ثارت في انتفاضات الربيع. وكذلك في امريكا اللاتينية كما هو حال رواية السيد الرئيس ، الذي تظهر فيها أحداث الثورة ضد الاستبداد.
Literary translation is one of the most difficult types of translation ,because it conveys feelings that differ from one person to another, and since the language constitutes an obstacle to understanding the Andalusian excerpts, the translators resorted to translating it, and this was a second start to the text, different from its first start, is said from the tongue of the Al-washah , The muwashshah is a poetic art that appeared in Andalusia after the Arabs entered it ,characterized by special system It differs from the traditional Arabic poem, as it has a beginning represented in the beginning of the muwashshah and several equal parts ending with differentrhymes.
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet. Maintaining solidity and integrity of a blockchain’s transactions is an important issue, which must always be borne in mind. Transactions in blockchain are based on use of public and private keys asymmetric cryptography. This work proposes usage of users’ DNA as a supporting technology for storing and recovering their keys in case those keys are lost — as an effective bio-cryptographic recovery method. The RSA private key is
... Show MoreThe context of multibiometric plays a pivotal role in enhancing an identification system, since a biometric system is now the most physical way of identifying and verifying individuals. The feature of multibiometric could be merged to produce identification information. However, unimodal biometric systems suffer from different types of breaching. Thus, mixing biometrics with cryptography leads to overcome small variations existing between diverse acquisitions of the same biometric in order to produce the robust system. In this paper, a new robust multibiometric system is proposed to create a random key from person multibiometric, facial and fingerprint images which are used simultaneously to produce this key. Several man
... Show MoreAs a new technology, blockchain provides the necessary capabilities to assure data integrity and data security through encryption. Mostly, all existing algorithms that provide security rely on the process of discovering a suitable key. Hence, key generation is considered the core of powerful encryption. This paper uses Zernike moment and Mersenne prime numbers to generate strong prime numbers by extracting the features from biometrics (speech). This proposed system sends these unique and strong prime numbers to the RSA algorithm to generate the keys. These keys represent a public address and a private key in a cryptocurrency wallet that is used to encrypt transactions. The benefit of this work is that it provides a high degree
... Show MoreRivest Cipher 4 (RC4) is an efficient stream cipher that is commonly used in internet protocols. However, there are several flaws in the key scheduling algorithm (KSA) of RC4. The contribution of this paper is to overcome some of these weaknesses by proposing a new version of KSA coined as modified KSA . In the initial state of the array is suggested to contain random values instead of the identity permutation. Moreover, the permutation of the array is modified to depend on the key value itself. The proposed performance is assessed in terms of cipher secrecy, randomness test and time under a set of experiments with variable key size and different plaintext size. The results show that the RC4 with improves the randomness and secrecy with
... Show MoreThere are large numbers of weakness in the generated keys of security algorithms. This paper includes a new algorithm to generate key of 5120 bits for a new proposed cryptography algorithm for 10 rounds that combine neural networks and chaos theory (1D logistic map). Two methods of neural networks (NN) are employed as Adaline and Hopfield and the results are combined through several sequential operation. Carefully integrating high quality random number generators from neural networks and chaos theory to obtain suitable key for randomness and complexity.
Many cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm. It is necessary to make this algorithm more efficient and powerful through
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreIn this paper, three main generators are discussed: Linear generator, Geffe generator and Bruer generator. The Geffe and Bruer generators are improved and then calculate the Autocorrelation postulate of randomness test for each generator and compare the obtained result. These properties can be measured deterministically and then compared to statistical expectations using a chi-square test.