Los nombres propios nombran a un ser o a un objeto, distinguiéndolo de los demás seres de su misma clase, se escriben siempre con letra mayúscula a principio de palabra. Los lingüistas hacen mayor hincapié en las divergencias de referencia, entre nombres propios y nombres comunes. Así, suele decirse que el sustantivo propio no tiene como referente ningún concepto. El asunto de la traducción de los nombres propios parecería una cuestión de gusto personal del traductor pero vemos también que en algunas épocas es más frecuente traducirlos, y en otras, por el contrario, se prefiere dejar esos nombres en su forma original, tal vez con algunas adaptaciones ortográficas. Parecería entonces cuestión de modas. Pero, eviden
... Show MoreAbstract
Praise be to Allah, The Lord of the worlds, and peace be upon
Muhammad the master of former and latter people, and peace be upon His
relatives, companions and those who followed Him to Judgment day.
After recognizing the prescription which is called (Al- Fadhaly's Thesis in
parsing of "There is no god but God") as it is related with the word of the
investigation of this issue attracted me, as being related with the idea of the
only one God that is mentioned in the prophetic speech, which is said by
Anas- God satisfies him- Who said, Said the Messenger Muhammad peace
be upon him " Goes out of the Hell who said: there is no god but God, and in
his heart a hair weight of charity, and goes out of the He
Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex
... Show MoreThe study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.
The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via
... Show MoreModern French novel has gained a distinctive status in the history of French literature during the first half of the twentieth century. This is due to many factors including the new literary descriptive objective style adopted by novelists like Alain Robbe – Grillet that has long been regarded as the outstanding writer of the nouveau roman, as well as its major spokesman, a representative writer and a leading theoretician of the new novel that has broken the classical rules of the one hero and evolved, through questioning the relationship of man and the world and reevaluating the limits of contemporary fiction , into creating a new form of narrative.
Résumé:
En vue de résu
... Show More