There are many ways to communicate a story, one can tell it, sing it, act it, write it, film it and can draw it. Each form of storytelling has its unique characteristics that separate it from the other forms. These distinguishing characteristics of each form does not indicate the superiority of one form over the other, on the contrary, it indicates the human ability to be creative on many levels. As students of literature, only the written form of a story is taken into account. One reason for the negligence of other forms of storytelling might be that singing and filming a story is not related to literature. But there has been a form of storytelling that uses words along with pictures which eventually became a genre of novels called graphic novel1. Graphic novels are "book – length, high quality comic books that introduce children's and adults to a wide range of literary fiction and nonfiction subjects."2 Comic books, on the other hand, are sequential narratives that are supported by graphics and images thus combining words with images to form a narrative.3 It has a distinctive form compared to other types of literature. Usually comic books tackle light, comic themes printed on glossy magazine – like paper, sold in bookstands and are relatively short.4 While graphic novels, on the other hand, tackle more mature and dark themes, are printed on book – like papers, are sold in bookstores and they are longer. Thus, the term graphic novel was used to distinguish it from comic books.5
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreThe performance of a solar assisted desiccant cooling system for a meeting-hall located in the College of Engineering/University of Baghdad was evaluated theoretically. The system was composed of four components; a solar air heater, a desiccant dehumidifier, a heat exchanger and an evaporative cooler. A computer simulation was developed by using MATLAB to assess the effect of various design and operating conditions on the performance of the system and its components. The actual weather data on recommended days were used to assess the load variation and the system performance during those days. The radiant time series method (RTS) was used to evaluate the hourly variation of the cooling load. Four operation modes were employed for perform
... Show MoreIn data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
В статье рассматривается вопрос об использовании мультимедийных средств для оптимизации процесса формирования коммуникативной компетенции в иракской аудитории с привлечением компьютерных технологий. Статья посвящена использованию мультимедийных технологий и различных приемов формирования интереса к русскому языку. Включение в процесс обучения коммуникативно-значимого, аутентичн
... Show MoreAutorías: Muwafaq Obayes Khudhair, Sanaa Rabeea Abed, Hayder Talib Jasim. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 1, 2023. Artículo de Revista en Dialnet.
Environmental risk growing Become challenge "and a matter of controversy and concern to many of those concerned with environment, social, economic, and the same happens with the administrative rather than in isolation for this movement, as the issues of climate change Disturbed and troubled him, especially after what caused the risk of destruction, and irresponsibility , chaos, and the futility of resources, crops, fields, nature and homes and reactors, and after what happened in Japan from the scourge of "Hurricane tsunami " and earthquakes successive accompanied him and what became of him by surprise catastrophic affected the economy and the univ
... Show MoreCurrent search problem manifested and widows who community harsh to bear hardships and pains، The goals of continuing the sustainability of life and take responsibility, and especially in light of the difficult circumstances in which Iraq is going through, and the displacement of murder and terrorism, which generated huge numbers of widows and orphans Because of the loss of a breadwinner and which became women and children are the most harm to the victim and as a result of wars and armed tendencies So this research is an important and vital topic opens our horizons important for overlapping roles of women widows and their impact on the achievement and status of Iraqi women and that as long as aptly characterized and their ability to end
... Show More