The rhetorical significance of history and the presentation of events through ages allow us to understand the mental changes and to investigate the evolution of the ideology of literary philosophy.
... Show More
It is axiomatical that the narrative prospective is profoundly significant to the writer who intends to commence his sketch of projected novel. It is the pillar of comprehensive absorbing as the writer should commit himself to circular his own concepts to the reader of his narrative characters.
The dilemma of plot-perception is a twofold aspect; partly offers the question: what is the authors stand in regard to his characters? And: what is the aim of this theme? These correlative questions are inseparable since the reader who wishes
... Show MoreSommaire
La question de la violence et de l'agressivité porte une importance remarquable dans l’esprit de Jean Genet qui estime le crime en le considérant comme beau. Il lui donne une valeur suprême. Il le glorifie avec ses personnages criminels. Le langage théâtral genétien est violent qui conduit à la fin à l’acte agressif, le crime et la mort. Ce théâtre qui aborde la condition humaine retrace sur la scène le chemin tragique de l’homme moderne.
... Show MoreResumen
Sotileza , localismo santandrino de sutileza , es la parte más fina del aparejo de pescar donde va el anzuelo. Es la obra maestro de José María de Pereda.Su ambiente , el Santander viejo, anterior al año 50,evocado emocionadamente - emociόn romántica contenida en los trazos sobrios y firmes de un naturalism psicolόgico y paisajista,el Santander que el autor confiesa poseer en el fondo de su corazόn,«y tenerlo esculpido en la memoria de tal suerte que ,a ojos cerrados,me atrevería a trazarle con todo su perímetro y sus calles, y el color de sus piedras, y el número, y los nombres, y hasta las caras de sus habitantes».Dentro de la grandeza primaria de las criaturas de Pere
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThe study is based on the selective binding ability of the drug compound procaine (PRO) on a surface imprinted with nylon 6 (N6) polymer. Physical characterization of the polymer template was performed by X-ray diffraction and DSC thermal analysis. The imprinted polymer showed a high adsorption capacity to trap procaine (237 µg/g) and excellent recognition ability with an imprinted factor equal to 3.2. The method was applied to an extraction column simulating a solid-phase extraction to separate the drug compound in the presence of tinoxicam and nucleosimide separately and in a mixture of them with a recovery rate more than the presence of tinoxicam and nucleosimide separately and in a mixture of them with a recovery rate of more t
... Show MoreThis paper studies a novel technique based on the use of two effective methods like modified Laplace- variational method (MLVIM) and a new Variational method (MVIM)to solve PDEs with variable coefficients. The current modification for the (MLVIM) is based on coupling of the Variational method (VIM) and Laplace- method (LT). In our proposal there is no need to calculate Lagrange multiplier. We applied Laplace method to the problem .Furthermore, the nonlinear terms for this problem is solved using homotopy method (HPM). Some examples are taken to compare results between two methods and to verify the reliability of our present methods.
AA Abbass, HL Hussein, WA Shukur, J Kaabi, R Tornai, Webology, 2022 Individual’s eye recognition is an important issue in applications such as security systems, credit card control and guilty identification. Using video images cause to destroy the limitation of fixed images and to be able to receive users’ image under any condition as well as doing the eye recognition. There are some challenges in these systems; changes of individual gestures, changes of light, face coverage, low quality of video images and changes of personal characteristics in each frame. There is a need for two phases in order to do the eye recognition using images; revelation and eye recognition which will use in the security systems to identify the persons. The mai
... Show More