Preferred Language
Articles
/
jcolang-678
The psychological structure of Simha Bin Zion, in the story of A Broken Soul: המבנה הפסיכולוגי של הסופר שמחה בן ציון בסיפורו נפש רצוצה כדוגמה
...Show More Authors

The present paper sheds light on the psychological structure of  Simha Bin Zion’s A Broken Soul. After reviewing the biography of the storyteller, it is clear that the hero of the rebellious character in the story of (A Broken Soul) is the writer himself. The storyteller directly begins to depict his psychological sufferings in his childhood days. He tells a story full of sadness and refusal of the neglect he suffered in his childhood. It is obvious that the early five years of Samha bin Zion’s life is considered a period of conflict that participated in the formation of his individual identity. The story represents an outlet for a hidden secret world buried under the layers of his consciousness. It deals with the dark and dark side of the life of a Jewish boy in the Diaspora, and the tragic existence full of restrictions represented by the cruelty of the strict educational system in Al-Haidar; (the Jewish religious school) where Samha bin Zion was a neglected child and a victim of the father's control at home and the teacher in school. The aim behind such a rigid way of education is to bring him to the inelastic Jewish conventions. At his present stage of contemplation and after a long search for his true self, the writer reveals the frustration and instability he suffered.

In short, the paper discusses the suffering of the writer’s personal conditions that enhanced his deep psychological problem, and helped to make him a great story teller.

תקציר

העיון הזה עוסק במבנה הפסיכולוגי של שמחה בן ציון בסיפורו נפש רצוצה כדוגמה. ראוי לציין, הסופרים העבריים משתמשים באמצעים ספרותיים שונים לבטא את דיעותיהם שמשקפות את השקפותיהם בדבר עצמם,גם הסופר בוחר השיטה המתאימה לו לפי הלך נפשו ויכולתו האמנותית.

בסיפור זה שמחן בן ציון מתאר את זכרונות ילדותו המתקשרים בנפש רצוצה. ונושא הסיפור הרודים בנער במקל וברצועה, ועליו לעמוד בפני עינויים אלה, וכך הוא נדחק ונלחץ לצדדים רבים, כאן הופיע המספר לפנינו, הריאליסטי החותך אל האמת הקודרת של החיים ומרידות המציאות, וכך מתבלטת בין שורות סיפורו נשמתו הצועקת מרד על המתחולל בעולמו ויגונו עולה מבין התיאורים האכזריים הריאליים.       

בסיפורו הגדול והחשוב ביותר מתאר שמחה בן ציון את חיי ילד העברי בבית אבא ובחדר עם בסיס נסיונו וזכרונותיו הוא החינוך הפגום המעציבות. חינוך החדר ובית האב הוא עתיד למרוד בתורת הורים ומורים, ובמלמדים האישיים, חיים אילו רדופים בעינויים, משבירים, שאיפות ותקווה לתמודה, וגם במחקר הזה טיפלנו בחייו של הסופר בקצור וגם ביצירותו באופן כללי. המחקר הזה עוסק באחד מהסופרים שנחשבו בעלי – השפעה בתהליך הספרות העברית החדשה ,וגם במחקר הזה טיפלנו בחייו של המספר בקצור וגם ביצירותו באופן כללי, העיון הזה ביקורת למלמודים של החדר בסיפורו של שמחן בן ציון. וגם הבהרת של הקונפליקט הפסיכולוגי של המספר. לפי אופי העיון השתמשנו בשיטה הפסיכולוגית, כי השיטה הפסיכולוגית מקשרת בין האוטוביוגרפיה של הסופר וישיותו . הבעיה העיקרית במחקר היא התשובה על שאלה חשובה מה הוא המניע מאוחורי כתיבת סיפור "נפש רצוצה". האם יש יחס בין המבנה הפסיכולוגי של 'שמחה בן ציון' לבין הספרות.

 

    

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
Proceedings Of The 12 Th Scientific Conference Foundation Of Technical Education
Swine Flue A Virus Subtype (H1N1) Infection in Iraqi.
...Show More Authors

Background: Swine influenza (also Called pig influenza, swine flu, hog flu and pig flu) is an infection by any one of several types of swine influenza virus (SIV) or S-OIV (Swine-Origin influenza virus) is any strain of the influenza family of viruses that is endemic in pigs. Patients and Methods:- Ninety patients with there families suspected of swine flu who were admitted to Central Teaching Hospital of Pediatric in Baghdad seventy one from Baghdad Al-Kerkh, twelve from Baghdad Al-Rasafa and seven other Iraqi Governorate (1 in Suleimaniya, 2 in Baquba, 4 in Anbar) they were included in a prospective study started from the 1st October till the 30 th of November 2009. Results:- The study revealed from )90( suspected cases the H1N1 Virus Pos

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Mon Jun 30 2014
Journal Name
Al-kindy College Medical Journal
Limping in twenty years old male A Case Report
...Show More Authors

Background: Osteoid osteoma(OO) is a relatively common benign skeletal neoplasm of unknown etiology that is composed of osteoid and woven bone, usually seen in adolescent and young males Although, the clinical, radiological and scintigraphic features of OO have been well described, these features may be misleading or altered in the cases of lesser trochanter of the femur which is relatively uncommon location for OO with a few number of cases reported up to date.Case Presentation: We report a case of a 20-year-old man who presented with painful limpThe pain had begun six months earlier and was made worse by walking and by exercise., with normal initial X-rays .The diagnosis was made after six months when typical Computed tomography, magne

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 11 2020
Journal Name
Sys Rev Pharm
Recent Development In Oxine Complexes AndTheirMedical Application: A Review
...Show More Authors

This review is concluded of 8-Hydroxyquinline (8HQ) compound and derivatives which has a very significant interests with a strong fluorescence , furthermore the relationship between divalent metal ions and characteristic of chelating . In the same way coordinated features have increase of its organic action and inorganic behavior by giving many samples of compounds which are a good chelating agents ligands with more capable of forming very stable complexes.Therefore, the role of (8HQ) is not limited on complexes only but its applications in different fields so this review will focus on demonstration preparation methods and properties of (8HQ) derivatives with their complexes and applications, hopefully that we will cover a part of scientifi

... Show More
Publication Date
Tue Jun 23 2015
Journal Name
Journal Of Intelligent & Fuzzy Systems
A note on “separation axioms in fuzzy bitopological spaces”
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Rawal Medical Journal
Obesity in COVID-19 patients is a complex interaction
...Show More Authors

Objective: To assess role of obesity in Covid-19 patients on antibodies production, diabetes development, and treatment of this disease. Methodology: This observational study included 200 Covid-19 patients in privet centers from January 1, 2021 to January 1, 2022. All patients had fasting blood sugars and anti-Covid-19 antibodies. Anthropometric parameters were measured in all participants. Results: The patients were divided into two groups according to body weight; normal body weight (50) and excess body weight (150). There was a significant difference between them regarding age. Diabetes mellitus developed in 20% of normal weight patients while 80% of excess weight patients had diabetes (p=0.0001). Antibodies production (IgM and

... Show More
Scopus Crossref
Publication Date
Fri Mar 23 2018
Journal Name
Entropy
Methods and Challenges in Shot Boundary Detection: A Review
...Show More Authors

View Publication
Scopus (63)
Crossref (55)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Rawal Medical Journal
Obesity in COVID-19 patients is a complex interaction
...Show More Authors

Objective: To assess role of obesity in Covid-19 patients on antibodies production, diabetes development, and treatment of this disease. Methodology: This observational study included 200 Covid-19 patients in privet centers from January 1, 2021 to January 1, 2022. All patients had fasting blood sugars and anti-Covid-19 antibodies. Anthropometric parameters were measured in all participants. Results: The patients were divided into two groups according to body weight; normal body weight (50) and excess body weight (150). There was a significant difference between them regarding age. Diabetes mellitus developed in 20% of normal weight patients while 80% of excess weight patients had diabetes (p=0.0001). Antibodies production (IgM and

... Show More
View Publication
Scopus Crossref
Publication Date
Wed May 04 2016
Journal Name
Journal Of New Theory
INTERSECTİONAL (α,A )-SOFT NEW-İDEALS İN PU-ALGEBRAS
...Show More Authors

Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref