The article deals with the role of metaphors in forming the plot of L. Ulitskaya’s family chronicle “Medea and Her Children”. The author of the article describes the results of the next stage of research related to the works of Lyudmila Evgenievna Ulitskaya, a representative of modern Russian prose. The analysis of tropes and figures in the works written at the turn of the XXth – XXIth centuries is of importance for the study of the modern state of Russian language as an independent system. “Medea and Her Children” is one of the works by L. Ulitskaya (written in 1996), which, like her other works, is characterized by a unique style of narration, rich in vocabulary, lexical, semantic and stylistic diversity of the author’s word, which is a response to the features of mentality of the described period in general and determines the relevance of the research. Scientific novelty of the material is presented as one part of the general study of the role of metaphors in the texts of L. Ulitskaya’s works and consists in the fact that the study of the role of metaphors used by the author to form the plot of the family chronicle through the prism of relationships and characteristics of the characters is conducted on the material of the novel “Medea and Her Children”. The main purpose of the article is to consider the metaphors with which the author forms the general plot line of the work by reflecting the relationship of Medea, the keeper of secrets and ideological foundations of the family clan, with other characters and their features. Over the course of the research the author examined the metaphors forming the general plot line of the family chronicle “Medea and Her Children”, inseparably connected with the image of Medea as the fundamental element and the voice of the author’s position in the complex of the general line of the characters of the work, and allocated into groups and subgroups according to the relationship with the main character of people of the family clan Sinopley and their close environment.
In this paper the research introduces a new definition of a fuzzy normed space then the related concepts such as fuzzy continuous, convergence of sequence of fuzzy points and Cauchy sequence of fuzzy points are discussed in details.
This work addressed the assignment problem (AP) based on fuzzy costs, where the objective, in this study, is to minimize the cost. A triangular, or trapezoidal, fuzzy numbers were assigned for each fuzzy cost. In addition, the assignment models were applied on linguistic variables which were initially converted to quantitative fuzzy data by using the Yager’sorankingi method. The paper results have showed that the quantitative date have a considerable effect when considered in fuzzy-mathematic models.
Means of communication has a great impact on all fields of awareness including health awareness by increasing the knowledge of community about health and developing their abilities to improve human health and cultural awareness. According to the importance of health awareness for a community to develop their intellectual and physical integrity, the researcher has found that it is essential to know the role of means of communication as a source of information for many students being active and main segments to build their society intellectually, socially and economically.
The research has focused on the study of health awareness among students and their health knowledge derived from the means of communicat
... Show MorePalm vein recognition is a one of the most efficient biometric technologies, each individual can be identified through its veins unique characteristics, palm vein acquisition techniques is either contact based or contactless based, as the individual's hand contact or not the peg of the palm imaging device, the needs a contactless palm vein system in modern applications rise tow problems, the pose variations (rotation, scaling and translation transformations) since the imaging device cannot aligned correctly with the surface of the palm, and a delay of matching process especially for large systems, trying to solve these problems. This paper proposed a pose invariant identification system for contactless palm vein which include three main
... Show MoreIdentity crisis is a dominant literary theme, especially in most Arab women writers’ works. However, it has not been given enough attention from a linguistic point of view. By so doing, the current study intends to fill this gap by analyzing the identity crisis from a pragma-stylistic perspective by examining the writer's style in three purposely selected extracts from Diana Abu-Jaber’s novel Origin (2007). The study aims to examine the identity crisis by using pragmatic and stylistic tools and to explore the effects of Abu-Jaber’s stylistic choices on the readers of her work. To conduct this study, an eclectic model comprising Searle’s speech acts (1979), Brown and Levinson's politeness theory (1987), Leech's model of figur
... Show MoreBackground: DVT is a very common problem with a very serious complications like pulmonary embolism (PE) which carries a high mortality,and many other chronic and annoying complications ( like chronic DVT, post-phlebitic syndrome, and chronic venous insufficiency) ,and it has many risk factors that affect its course, severity ,and response to treatment. Objectives: Most of those risk factors are modifiable, and a better understanding of the relationships between them can be beneficial for better assessment for liable pfatients , prevention of disease, and the effectiveness of our treatment modalities. Male to female ratio was nearly equal , so we didn’t discuss the gender among other risk factors. Type of the study:A cross- secti
Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreCo-composting process can be acquired by combining organic fraction of municipal solid waste (OFMSW) with sewage sludge (SS) and mature compost (MC) as enhancement and bulking agent to overcome the problems of municipal solid waste and wastewater treatment plants besides the finally produced fertilizer usage for agriculture and horticulture. The effects of different mixture ratios of (OFMSW), (SS) and (MC) on the performance of composting process were investigated in this study. Piles of about 10 kg were prepared by mixing OFMSW, SS and MC in three different ratios (w/w) [OFMSW: SS: MC= 3:1:1, 3:2:1, and 3:3:1]. Results showed that the pile [3:1:1] was most beneficial to composting. The final compost products contained a
... Show MoreTeen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC
... Show MoreIn this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.