Abstruct
This recearch is about studying the novel (doorstep’s women) by the Iraqi
narrator Hadia Hussian, and I choose Semiolog as a Curriculum for this
critical approach, because I think that this Semiotic curriculum has the ability
to read the Subjects and the narrative constructions. Which form the structure
of the novel starting from the little to the characters.
The focus is on many narrative constructions in the novel we have
studied the semiology of the tittle, the semiology of the cover, of the color, the
names of the characters and the semiology of the female characters.
First the focus of the novel is on the women’s characters because most
of it’s characters are women. Secondly because these characters are
senestive and soft in expressing the Iraqian reality due to the three wars that
Iraq has come through. Finally because the novelist constrates her intrest on
the female character. Intentionally to show the suffering of women due to the
constant wars that Iraq has come through.
In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreBackground: Women sexuality is basic right and it plays a major role in women's Health aspects. Up is one of the factors that lead to sexual dysfunction while the incidence of it is rising as UP severity being more. Objectives: To assess the impact of different degrees of uterine prolapse on sexual function of women at teaching hospitals in AL-Hilla City. Methodology: A descriptive analytical study was conducted from 1ST Feb to 10th Jun /2014 to assess the impact of different degrees of uterine prolapse on sexual function for women who attend to consultant clinic at teaching hospitals in AL-Hilla City
Iraq suffers from lack of water resources supply because the headwaters of the rivers located outside its borders and the influence of upstream countries on the quantities of flowing water, in addition to the increase of pressure on available water as a result of population increase and not adopting the principle of rationalization where misuse and wastage and lack of strategic vision to treat and manage water use in accordance with the economic implications fall. This is reflected fallout on water security and subsequently on national and food security, while the issue of using water resources is development top priority in different countries in the world because of the importance of water effect on the security of indivi
... Show MoreAfter this stage in the Bible is problematic and the profane in the poetry of the AL-Sayeghs,
and found that the poems path heading towards obey religious authority because of their wills
and powers, and the insurgency in other areas, as it did not employ shady methods and puns
and intriguing, and I find the reason for this is due to the fear poet focused toward the
influence of political Sergeant, more than effusion direction ascendancy religious sergeant,
was a AL-Sayeghs stop at this border; but went to the formulations problematic diversity in
the cognitive system, he tries it all to critique, as submitted by the history of the conflicts
produced generations of oppression and conflict and tension (what my fault I