This paper introduces a relationship between the independence of polynomials associated with the links of the network, and the Jacobian determinant of these polynomials. Also, it presents a way to simplify a given communication network through an algorithm that splits the network into subnets and reintegrates them into a network that is a general representation or model of the studied network. This model is also represented through a combination of polynomial equations and uses Groebner bases to reach a new simplified network equivalent to the given network, which may make studying the ability to solve the problem of network coding less expensive and much easier.
Environmental risk growing Become challenge "and a matter of controversy and concern to many of those concerned with environment, social, economic, and the same happens with the administrative rather than in isolation for this movement, as the issues of climate change Disturbed and troubled him, especially after what caused the risk of destruction, and irresponsibility , chaos, and the futility of resources, crops, fields, nature and homes and reactors, and after what happened in Japan from the scourge of "Hurricane tsunami " and earthquakes successive accompanied him and what became of him by surprise catastrophic affected the economy and the univ
... Show Moreيعد التكرار من الظواهر الاسلوبية التي اتخذت دورها في بناء النص الشعري الحديث ويقوم على جملة من الاختيارات الاسلوبية لمادة دون أخرى ولصياغة لغوية دون سواها ، مما يكشف في النهاية عن سرّ ميل هذا النص الشعري أو ذاك لهذا النمط الاسلوبي دون غيره ، وعلى الرغم من ان التكرار يعد مسألة عامة وشائعة في العمل الأدبي ، فأن الاهتمام بهذا الجانب من المنهج الاسلوبي يأتي من جهة كونه مهيمناً له ايحاءاته ودلال
... Show MoreLanguage is the realistic and sensitive basis for any communication between two or more parties. It is an important workshop that prepares meanings and coding them according to a linguistic structure governed by agreed rules that speak to and coexist with everyone.
Whereas the forms of communication are: personal, mediator and mass, none of them can move away from language in their dealings and communication patterns. Since each has its own characteristics and skills, it must be launched in its fields through verbal and non-verbal symbols and wears the elements of influential language as intended.
It makes the recipient face two things: whether he fails to understand those symbols hence its purpose fail, or he meditates s
... Show MoreLong memory analysis is one of the most active areas in econometrics and time series where various methods have been introduced to identify and estimate the long memory parameter in partially integrated time series. One of the most common models used to represent time series that have a long memory is the ARFIMA (Auto Regressive Fractional Integration Moving Average Model) which diffs are a fractional number called the fractional parameter. To analyze and determine the ARFIMA model, the fractal parameter must be estimated. There are many methods for fractional parameter estimation. In this research, the estimation methods were divided into indirect methods, where the Hurst parameter is estimated fir
... Show MoreIn this paper , some of lexical stylistic , syntactical stylistic devices , and one phonetic stylistic device are going to be illustrated in the study of the aphorisms of “life and death” . These stylistic devices are parallelism , hyperbole , alliteration , meiosis , irony , oxymoron , cliché , litotes , metalepsis , and loose sentences. This paper aims at identifying the functions and the frequencies of these devices. These stylistic devices make one speech and writing more interesting and help to get the attention of readers/ listeners
Our research tends to study the poetic attempt of Badr Shakir Al-Sayyab and examine it stylistically, and we suggested his mature collection '' Rain song'' as a pattern for our textual analysis of the poet's attempt.
In the beginning , we confirm that branches of applied structures meet to produce poetry such as narration , drama , cinema , mythology , allegory , various religious and historical texts , previous events , and special cumentary events related to work production. If all above-mentioned was complicated and disregarded throughout a single text , the text writer would not secure positive results that might keep open continuity between him and his readers.
Therefore , this issue w
... Show MoreThe aim of this research is to show the importance of the effective use
of the internet in academic libraries; to improve the services and to increase
the competence of librarians.
The research has given some recommendations to improve the quality
of services and the need for cooperative network among academic libraries.
Reaction of,2- [( 4- amio phenyl ) diazenyl] 1,3,4- thiadiazole -5- thiol (S1) with p- chlorobenzeldehyde,3,4 – dimethoxy benzaldehyde and pyrrol-2- carbonxaldehyde gave -5- [{4-(4-chlorobenzylidene amino) phenyl} diezenyl]-1,3,4- thiadiazole-2- thiol (S2),5-[{ 4-[(3,4- dimethoxybenzyldene )amino phenyl ] diazenyl)-1,3,4- thiadiazole-2-thiol,(S3) and -5- [4-(1,H – pyrrol -2- yl- methylene)amino phenyl] diazenyl)-1,3,4- thiadiazole-2- thiol (S4) respectively as schiff's bases compounds. On the same route-2-[(4-amino-1- naphthyl ) diazenyl] -1,3,4- thiadiazole -5- thiol (S5) reacts with –p- chloro benzaldehyde and –m- nitrobenzaldehyde to give the follwing schiff's bases -5-[{ 4-(4- chloro benzylidene ) amino -1- naphthyl} diazenyl]
... Show MoreThe traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show More