This paper deals with novels for group of Iraqi Women novelists published in the time period 2003 – 2013, and the functioning of temporal anomalies in the Iraqi Women's narrative.
In general, the novel contains structural elements such as: the characters, events and the places, these elements must be collected by an artist creating a complete work of fiction. However the time dominates the other elements through progression and regaining called Time paradox, it has a modern critical importance because of its impact in highlighting of political, social and cultural events that make up the fictional environment which cast a shadow over other techniques. And that it is clear in the course of the narrative.
In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreColorectal cancer (CRC) is the most common gastrointestinal malignancy and one of the top ten common cancers worldwide with approximately 2 million cases. There are multiple risk factors that could lead to CRC emergence; of which are genetic polymorphisms. Excision repair cross-complementing group 2 (ERCC2) gene encodes for ERCC2 enzyme which plays a crucial role in maintaining genomic integrity by removing DNA adducts. Several studies suggested that there could be a link between genetic polymorphisms of ERCC2 gene and the risk of CRC development. Hence the present study aims to validate the relationship between the following ERCC2 single nucleotide polymorphisms (rs13181, rs149943175, rs530662943, and rs1799790) and CRC susceptibility. A t
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show Moreتنفذ أجهزة اإلحصاء الدولية ومنها الجهاز المركزي لإلحصاء في العراقإحدى أجهزة وزارة التخطيط، تقوم بإجراء مسوح سنوية ودورية لإنتاج مؤشرات تقييم وتقويم أنشطة القطاعات الاقتصادية المختلفة. يتيح هذا الكم الهائل من البيانات بشكل سلسل زمني لهذه الأجهزة إنتاج مؤشرات جديدة، بما في ذلك القيم التنبؤية لمؤشرات رئيسية تستخدم في إعداد الخطط طويلة وقصيرة المدى. في عام 2015، قامت مديرية الإحصاء الزراعي في الجهاز المركزي للإ
... Show MoreThis study aimed at identifying how children express the emerging coronavirus in general and according to their age groups (4-13 years) by analyzing 91 of their drawings published online, using the descriptive content analytical approach. The results showed that children's artistic expression of the virus came according to the concepts and ideas they carried about the virus for the age groups of (4-7 years) and (7-9 years), while it came according to visual perception for age groups (9-11 years), and from (11-13) years. Also, most children were aware about the presence of the virus and its widespread around the world, but (99%) of them do not realize the seriousness of the virus. It was confirmed that between (25-34%) of children were su
... Show More