This study is concerned with the concept of offering a point of view as a narrative construction element, especially the element and point of view of the novel to the letter Alcinmatugrave both business taken from masterpieces and literary works in the foundation or set of cinema. On the whole, the narrator participate in mock narrative process and support the narrator visual image, especially stories that need to exist scenes prove added to the image that uses signs of reality to take those marks a new dimension not only across the image, but also the intervention of the narrator in the re-formation of this realism marks surrounding Palms perceived and visible and put markers regularly between what the narrative of privacy and image, for this, we find that this research may be unique in the analysis of film "The legend in 1900" to achieve the goals
The e-commerce is one of the best achievements of the twentieth century, since the conduct commercial transactions via the Internet may be the consumer easy selection process and purchase convenient manner different from traditional methods, and with the beginnings of the new millennium impose the emergence of e-commerce term significant challenges to the insurance industry as an important economic sectors Generally, and insurance companies in particular as a result of scientific development, which has led to a reduction in costs and innovation in the production, which led to intense competition on both levels local or global. The insurance industry is a vital part of the economy and it has a varied impact to the community and individual
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show MoreWith increased climate change pressures likely to influence harmful algal blooms, exposure to microcystin, a known hepatotoxin and a byproduct of cyanobacterial blooms can be a risk factor for NAFLD associated comorbidities. Using both
يعد النظام التعليمي لاي بلد انعكاسا للمستوى الثقافي والحضاري للمجتمع وعادة ما يحدد هذا النظام ويوجه من قبل التنظيمات السياسية والاقتصادية والاجتماعية في المجتمع كونها تعتمد علية في تحقيق اهدافها ,وصبحت الجامعة اليوم تمثل عمد النظام التربوي والتعليمي بما تمتلكه من كفاءات وقد ا رت وامكانيات بشرية ومادية تستطيع من خلالها رفد المجتمع بما يحتاجة من قد ا رت بشرية متعلمة في كافة الاختصاصات ومناحي الحياة لادامة ال
... Show Moreلكل دولة في هذا العالم خطابها السياسي والذي يحدد سياستها الداخلية والخارجية، وهي سياسة ثابتة تنطلق من مفاهيم وبرامج وثوابت تخدم مصالحها الحيوية، لكون الخطاب السياسي ليس مجرد كلام عابر في عالم السياسة الدولية وانما هو ثوابت مهمة يحدد توجهات هذه الدولة او تلك ويحدد دورها الدولي وطبيعة العلاقة مع البلدان الاخرى ومنها الدول المجاورة لها. شهد العراق بعد العام 2003 تحديات جديدة تمثلت بتغليب خطابات الطائفية والكراه
... Show Moreلكل دولة في هذا العالم خطابها السياسي والذي يحدد سياستها الداخلية والخارجية، وهي سياسة ثابتة تنطلق من مفاهيم وبرامج وثوابت تخدم مصالحها الحيوية، لكون الخطاب السياسي ليس مجرد كلام عابر في عالم السياسة الدولية وانما هو ثوابت مهمة يحدد توجهات هذه الدولة او تلك ويحدد دورها الدولي وطبيعة العلاقة مع البلدان الاخرى ومنها الدول المجاورة لها. شهد العراق بعد العام 2003 تحديات جديدة تمثلت بتغليب خطابات الطائفية والكراه
... Show MoreFuture generations of wireless networks are expected to heavily rely on unmanned aerial vehicles (UAVs). UAV networks have extraordinary features like high mobility, frequent topology change, tolerance to link failure, and extending the coverage area by adding external UAVs. UAV network provides several advantages for civilian, commercial, search and rescue applications. A realistic mobility model must be used to assess the dependability and effectiveness of UAV protocols and algorithms. In this research paper, the performance of the Gauss Markov (GM) and Random Waypoint (RWP) mobility models in multi-UAV networks for a search and rescue scenario is analyzed and evaluated. Additionally, the two mobility models GM and RWP are descr
... Show More