There are many ways to communicate a story, one can tell it, sing it, act it, write it, film it and can draw it. Each form of storytelling has its unique characteristics that separate it from the other forms. These distinguishing characteristics of each form does not indicate the superiority of one form over the other, on the contrary, it indicates the human ability to be creative on many levels. As students of literature, only the written form of a story is taken into account. One reason for the negligence of other forms of storytelling might be that singing and filming a story is not related to literature. But there has been a form of storytelling that uses words along with pictures which eventually became a genre of novels called graphic novel1. Graphic novels are "book – length, high quality comic books that introduce children's and adults to a wide range of literary fiction and nonfiction subjects."2 Comic books, on the other hand, are sequential narratives that are supported by graphics and images thus combining words with images to form a narrative.3 It has a distinctive form compared to other types of literature. Usually comic books tackle light, comic themes printed on glossy magazine – like paper, sold in bookstands and are relatively short.4 While graphic novels, on the other hand, tackle more mature and dark themes, are printed on book – like papers, are sold in bookstores and they are longer. Thus, the term graphic novel was used to distinguish it from comic books.5
The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show MoreWater represents as a basic intellectual material in the myths of creation and the start of formation, Thus, water has turned into an intellectual material in literary mythological texts in addition to its function in sculptural Mesopotamian sculpture. The research is in three sections: the first section deals with Myth, its concept, peculiarities and types, the second section is about mythological literature, the third section is about the idea of water and mythical literature. The question research question here is that does the idea of water have any impact on mythological literature? And Does it link to sculptural products? The importance of the research is that it shows the human imagination and its relationship to functioni
... Show MoreThe study includs,effect of concentration of Lead 0.2 ,0.3 , 0.5, 5 , 10 mg/L and Zinc 0.1,0.5 , 2 , 4 , 8 mg/L lonely or to gether on growth green algae( Scenedesmus quadricauda var . longispina) according to the total qauntity for the cells and the adsorption of the algae to the zn,pb concentration .growth curve and dubbling time growth were calculated with or without there heavy metals . Results shows that there are significant differences (P<0.01) for growth curve and the control. (7.5201 cell /h)and with dubbling times (9.87 cell/h). The heavy metals(Pb, Zn). shows antagonistic effect when both used in media.
The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreThere are many developments in political, strategic aspects in the middle east either in
international field which represented by U.S.A as first polar in world or territorial field which
represent by Turkey and Iran, as territorial powers in the region, Turkish role is fit with
American position in order to draw new map of middle east, Turkey advocate new policy to
confirm its attitude in Euro peen Union and its relation with U.S.A.
Iran adopted policy of Expansion in Iraq, Yamen, Lebanon and Syria, in addition Iran
enlist all it efforts to develop its Nuclear program and enter Nuclear club which make Iran,
Super power in middle east and the world, each Turkey and Iran have certain attitudes toward
all political c
This paper deals with the most important factors leading to child marriage and the importance of the study shed light on the factors leading to the marriage of minors than to underage marriage of repercussions on society and on the individual and household level, and thus its effects on the development of Almrah Battabarha half of society Vsba minors hinders progress Almrah and deprive of her childhood and deprive them of education leading to the spread of illiteracy , in addition to the marriage of minors having psychological risks, health and social girl and the family together.
The objectives of the study focused on identifying the socio and cultural factors leading to the marriage of minors, and highlights the marriage Alqaasratal
The study tries to answer several questions posed by the subject, one of the important: How the Internet promotes rumor? And what are the most Internet applications that promote rumor? And the practical ways to reduce these negative? Using the process of in vestige and reading theoretical heritage available in this field, and inferred the numbers and statistics marked the uses of the Internet and its applications over recent years, and the characteristics of each these tools in the field of collection, processing, and dissemination of information
This research presents a comparison of performance between recycled single stage and double stage hydrocyclones in separating water from water/kerosene emulsion. The comparison included several factors such as: inlet flow rate (3,5,7,9, and 11 L/min), water feed concentration (5% and 15% by volume), and split ratio (0.1 and 0.9). The comparison extended to include the recycle operation; once and twice recycles. The results showed that increasing flow rate as well as the split ratio enhancing the separation efficiency for the two modes of operation. On the contrary, reducing the feed concentration gave high efficiencies for the modes. The operation with two cycles was more efficient than one cycle. The maximum obtained effici
... Show MoreA general and accurate morphological study was carried out for the species Calotropis procera which belongs to the family Asclepiadaceae. The research included the phenotypic characteristics of the root, stem and leaves the leaves were studied morphologically and anatomically, Flowers, fruits and seeds, as well as the geographical distribution of the genus were studied also. In general, there are no previous taxonomic study of this genus under consideration, according to the available sources and it is the first one has been done in Iraq, perhaps Because of its low prevalence previously, where it was recently noticed its spread in last two to three years ago. Keywords: Apocynaceae, Apple Sodom, Poisonous Plant, Anatomy