The semiotic trend of recent monetary trends task that took a wide range of attention of critics and readers alike, especially after the deployment, which accompanied him after widespread acts critic Grimas and powers applicable to the literary texts and is thus expanded its care circle, hence the choice of the novel (absent) woman Iraqi novelist (Mahdi ‘Issa falcon) model to be applied to the study chose to be a semiotic approach through the use of procedural mechanisms for its critical tool (Paris School of semiotics), cash and views of its founder critic Grimas.The research in the introduction and pave came we made it a vision for literary semiotic and its impact trend in cash and cash is and what it desire to clarify some poked such a difference critics about his appearance and its definition, etc., and then we divided the study on the three sections, and came first section entitled (rhetorical) level, The second came to study (the narrative level), and the third dedicated to the study of (deep level), then Khtmana study conclusion offered the most important outcome of the research, followed by a list of sources and references of the study.
The current study aims to examine the level of problems faced by university students in distance learning, in addition to identify the differences in these problems in terms of the availability of internet services, gender, college, GPA, interactions, academic cohort, and family economic status. The study sample consisted of (3172) students (57.3% females). The researchers developed a questionnaire with (32) items to measure distance learning problems in four areas: Psychological (9 items), academic (10 items), technological (7 items), and study environment (6 items). The responses are scored on a (5) point Likert Scale ranging from 1 (strongly disagree) to 5 (strongly agree). Means, standard deviations, and Multivariate Analysis of Vari
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe study aimed to prepare rehabilitation exercises using some rubber ropes for people with partial rupture of the anterior cruciate ligament, to recognize their effect on the recovery of motor tides and to reduce the pain of those with partial rupture of the anterior cruciate ligament of the knee joint, and adopted the experimental method by designing the experimental and controlled groups on a sample of those with partial rupture of the anterior cruciate ligament of men (30-35) One year of those who attend the Physiotherapy Center/Rafidain University College of 12 injured were deliberately selected from their community of origin by (100%), and after determining the measuring tools and preparation of exercises applied with rubber r
... Show MoreEconomists agree upon the importance of exports and their positive impacts on the economic variables. Therefore، they studied policies encouraging exports and set out the instrumentalities supporting them. These instrumentalities included a combination of fiscal، monetary، commercial، production policies like the tax policy that is encouraging to the exports، exchange rates reduction، establishing commercial free zones، better production quality، fostering investment climate، and preparation of the necessary financing before the exporting process and afterwards.
This research is interested in the finding aspect amongst the instrumentalities encouraging exports which is parallel t
... Show MoreThe idea of the design of combination Between split – plot and split block means that an experiment conducted with a design
formed by combination Between split – plot and split block, and it presents a precise manner to analytic who aimed to make appropriate statistical analysis for the experiment because such design contains four random errors , it make a high precision rather than another designs. The plan and the theoretical analysis were presented with application to show its idia and the ability to use it in many fields especially in agricultural experiments field .
The Electric Discharge (EDM) method is a novel thermoelectric manufacturing technique in which materials are removed by a controlled spark erosion process between two electrodes immersed in a dielectric medium. Because of the difficulties of EDM, determining the optimum cutting parameters to improve cutting performance is extremely tough. As a result, optimizing operating parameters is a critical processing step, particularly for non-traditional machining process like EDM. Adequate selection of processing parameters for the EDM process does not provide ideal conditions, due to the unpredictable processing time required for a given function. Models of Multiple Regression and Genetic Algorithm are considered as effective methods for determ
... Show More