نقدم في هذا البحث تحليل لعملين أدبيين من منظور الحركات الطليعية ثبتت آثارها لدى بعض الكتاب العرب و أمريكا اللاتينية في فترة سنوات العشرينات والألفين. كانت الحياة الخاصة للكاتب ميغيل انخل استورياس تلهمه أنتاج أعمال أدبية، اذ شغل منصب دبلوماسي وحصل على جائزة نوبل غواتيمالاكا. ولد وتوفى في مدينة غواتيملاكا (1974- 1899) يوجد تحول واضح في عمله ذات الشهرة السيد الرئيس(1948) الذي يكسر المعتاد، لأجل مستقبل مكسو بالأفكار الجديدة. استخدمت اللغة، والقواعد والجمل بشكل عنيف لنتائج تخدم المجتمع. ترجم هذا العمل لعدة لغات، واستخدم في السينما والمسرح وكل ذلك لفائدة اجتماعية. تظهر الرواية العناصر السياسية، والاقتصادية، والاجتماعية، كما توجد قلة الرحمة واللاإنسانية واضحة من خلال أحداث الرواية، يحاول الكاتب توضيح ما كان يجري في تلك الفترة. اظهر استورياس الدكتاتور كشخصية غامضة في العمق لا تظهر ويشعر بتأثيرها السيء من كل جانب. مازن عرفة، كاتب سوري الأصل، ولد سنة 1955، و حصل على شهادة الآداب في قسم اللغة الفرنسية من جامعة دمشق، وفيما بعد حصل على الدكتوراه في العلوم الإنسانية، قسم المكاتب، من جامعة ماريا كوري (لوبلين-بولونيا)، حاول من ألمانيا مركز أقامته، أعطاء القراء لمحة عن ما فعلت الدكتاتورية مع أبرياء سوريا الذين أعلنوا الانتفاضة الربيعية، من خلال أنتاجه وهو "الغرانيق" سنة 2017، وذلك للحصول على حقوقهم الشرعية في الحياة. تتكون الرواية من ثلاثة أجزاء: الدكتاتورية، تاريخ سوريه في زمن الانقلاب والانتفاضة. تم نشره في بيروت وحصل على صدى نقد بناء. الغرانيق، هي أنظمة عسكرية جعلت لنفسها أصنام تشبه آلهة، وهذا التشبيه حدث في كثير من البلدان العربية التي ثارت في انتفاضات الربيع. وكذلك في امريكا اللاتينية كما هو حال رواية السيد الرئيس ، الذي تظهر فيها أحداث الثورة ضد الاستبداد.
The constitutional system in Iraq went to the necessity of the independence of the parliament in setting its internal system, for the purpose of organizing parliamentary work in parliament, so our research came to this decree (the role of the internal system of the Iraqi parliament in activating parliamentary performance), where the importance of this system is highlighted in the advancement of the reality of parliamentary work For members of the House of Representatives, in order to truly represent their constituents, as they are empowered to enable them to exercise the two most important functions. The first is to legislate laws, by discussing and adopting them within a reason
... Show MoreThe judge's estimation power in giving the judicial term in the execution case is represented in the possibility of amending the term of the contract commitment. That term on which both parties agreed to execute the contract commitment at its due date, because at the due date of fulfilling the commitment the debtor is bounded to pay, yet this fulfillment may be exhausting to the debtor, or causing him damage or harm more than that damage caused to the creditor in delaying the fulfillment.
&nb
... Show MoreThe study of the current study (to the concept of the aesthetics of the imagined in Iraqi ceramics (Saad Shaker) as a model for the study, as it represents one of the most important plastic arts that was characterized by renewal and modernity and its possession of many creative potentials. And by glazing, and the use of color oxides or by the creative act of borrowing the cultural heritage to turn it into a vocal piece of art for creation and innovation.
The researcher (Saad Shaker), being one of the first potters, his ceramics had a lot of development and semantic transmission, studying and decoding codes written in ceramic works. The current study included the theoretical framework in the first research (the philosophical beauty) an
في هذا العصر - الذي داهمت في الأخطار لغة الفصاحة والبيان - يبقى القرآن الكريم أعظم حافظ للغة السليمة ، وأكبر معين لأهلها للحفاظ على ثرائها وبلاغتها ، فهي باقية ببقائه ما بقي الليل والنهار .
وهذا البحث يدور حول حفظ القرآن الكريم وأثره على لغة الطفل، ويتكون من مقدمة : وفيها بيان أهمية الموضوع ، وخطة البحث ، ومنهجه، وثلاثة مباحث:
المبحث الأول : فضل حفظ القرآن الكريم ، وفوائد حفظه إجمالاً ، والمبحث الثاني :
... Show More
Abstract This research deals with the definition of the concept of nodal purposes, And what is related to it, from its aim and importance, And for the purposes of the importance of Streptococcus In trying to understand the nodal truths For different minds, Especially with those who object to the introduction of belief in purposes studies, This research has two requirements: The first requirement: the concept and the aim of contractual purposes,It consists of two branches, The first is in the concept of nodal purposes, And it dealt with the definitions in terms of language and terminology And what we see is proportional to what aim |
The research aims to identify the impact of using the electronic participatory learning strategy according to internet programs in learning some basic basketball skills for middle first graders according to the curricular course, and the sample of research was selected in the deliberate way of students The first stage of intermediate school.As for the problem of research, the researchers said that there is a weakness in the levels of school students in terms of teaching basketball skills, which prompted the researchers to create appropriate solutions by using a participatory learning strategy.The researchers imposed statistically significant differences between pre and post-test tests, in favor of the post tests individually and in favor of
... Show MoreThe Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreBackground: Telmisartan is an antihypertensive angiotensin II receptor antagonist drug commonly used to treat hypertension and renal disease. Based on the Biopharmaceutical Classification System. It’s a Class II poorly soluble drug.
Objective: To prepare a sublingual tablet by increasing the dissolution and solubility of Telmisartan utilizing the solid dispersion method.
Methods: Three methods were obtained to prepare the solid dispersion of telmisartan: solvent evaporation, Kneading, and microwave method. Each method uses surplus as a hydrophilic carrier in different ratios of 1%, 2%, and 3%. Preparation of ternary solid dispersion by adding potassium carbonate salt to
... Show MoreSteganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.