Preferred Language
Articles
/
jcolang-680
The Broken Wings: The character of the Arab Christian |Woman in Sami Michael's Novel "Trumpet in the Wadi" versus "Jasmine" by Eli Amir: הכנפיים שנשברו דמות האישה הערבית הנוצרית ברומן " חוצוצרה בוואדי " של סמי מיכאל לעומת דמותה ב " יסמין " של אלי עמיר
...Show More Authors

Sami Michael and Eli Amir - two Israeli writers born in Iraq and of the same generation (Sami Makhail was born in Baghdad in 1926 and Eli Amir in 1937). They wrote in their novels, among other things, about Orientalism , love and femininity. They both lived wild, extroverted lives. They did not shy away from experiencing anything new that came their way, rebelled against conventions and acted provocatively; they enjoyed the shock and amazement that evoked around them. While trying to find their place in different family settings, they chose to present two Arab Christian heroines. The narrator in Jasmine is the speaker Noori-Eli himself. While the narrator of “Trumpet in the Wadi” is Huda the heroine herself. Both are independent and both have a hobby in which they invest a lot; which is reading.

 The families of the two protagonists undergo social changes during the plot, and when necessary they both work to provide the family needs. First, the study sheds light on the importance of the Arabs in Israeli literature as reflected in Sami Michael's book: "Trumpet in the Wadi" "(2008) and Eli Amir's: Jasmine (2005).  It, also, provides summaries of the two novels and discusses the character of the Arabic Christian woman as described in both novels.

Chapter two debates the characters of Huda and Jasmine and similarities of the two in representing their time. The chapter also compares the recurring image of the Christian Arab character in the two novels, the concept of racism, characters description, as well as the subjects discussed throughout the books with an number of citation taken from the book.

תקציר

סמי מיכאל ואילי עמיר - שני סופרים ישראליים ילידי עיראק ובני אותו דור (סמי מכאיל נולד בבגדד בשנת 1926 ואלי עמיר ב-1937). כתבו ברומניהם, בין השאר, על המזרחיות ועל האהבה ונשיות.ושניהם חיו חיים פרועים, מוחצנים. לא נרתעו מהתנסות בכל דבר חדש שנקרה בדרכם, מרדו במוסכמות ונהג באופן פרובוקטיבי, הם נהנו מהזעזוע והתדהמה, שהם מעוררים סביבם. מנסים למצוא את מקומם במסגרות משפחתיות שונות, לכן הם בחרו להציג שתי גבורות ערביות .ושתי הגיבורות הן בחורות נוצריות ערביות והן והדובר ברומן "יסמין" הוא דובר- בגוף ראשון , ב"חצוצרה בוואדי" הדוברת היא הודא הגיבורת , אך ביסמין הדובר הוא נורי – אלי עצמו. שניהם עצמאיים ולשניהם יש תחביב שהם משקיעים בו רבות; הקריאה. המשפחות של שתי הגיבורים עוברות שינויים חברתיים במהלך העלילה, ובשעת הצורך שניהן עובדות  לממן צרכים שהמשפחה אינה יכולה לממן. ברומנם במחקר זה ואתעניין בספרם של סמי מיכאל: "חצוצרה בוואדי"" (2008) ובין ספרו של אלי עמיר: יסמין( 2005). מחקר זה מבקש לבדוק כיצד מצטיירת דמותה של האישה הערבית הנוצרית בשני רומנים מפורסמים של השניים . תחילה אתייחס למקומו של הערבי בספרות הישראלית ,  ואציג את תמצית שני הרמנים עם חיי הסופרים, ואדון בדמות האישה ודרכי איפיונה בהסתמך על ספרות תיאורטית.     
בפרק השיני אתעניין לדמותיוהן של הודא ויסמין כמייצגות את התקופה, ולבחון את הקווים הבולטים בדרכי עיצובה. ,ואשווה בין הדמות הערבית הנוצרית החוזרת בשני הרומנים, ואבדוק מהי עמדת המוצא שלהם, כיצד הם מתארים את שתי הדמויות ובמה הם בוחרים להתמקד.מפאת תחומו המצומצם של הדיון, העיסוק בנושא יתמקד במבחר דוגמאות נבחרים מן שני הרומנים.

 

     

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Current Science
Histopathological changes in golden hamsters induced by Leishmania tropica
...Show More Authors

.

Preview PDF
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Plasmid role in agar utilization by Pseudomonas sp. HK1
...Show More Authors

Forty different samples (water and soil) were collected from different places in Iraq and Syria. Only (6) isolates showed the ability to grow and utilize agar as a sole source of carbon and energy. Morphological, cultural characterization and biochemical tests confirmed that These isolates belonging to genus Pseudomonas (HK1-HK6) .Plasmid profiles results showed that these isolates were harbored (2 -3) small Plasmids . HK1 isolate was selected because of its efficiency and ability to grow in high density on agar media for transformation and curing experiments, these were checked by transformation experiments after their expression in E. coli MM294. The genes responsible for agar utilization were located on thes

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 31 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Image segmentation by using thresholding technique in two stages
...Show More Authors

Image segmentation can be defined as a cutting or segmenting process of the digital image into many useful points which are called segmentation, that includes image elements contribute with certain attributes different form Pixel that constitute other parts. Two phases were followed in image processing by the researcher in this paper. At the beginning, pre-processing image on images was made before the segmentation process through statistical confidence intervals that can be used for estimate of unknown remarks suggested by Acho & Buenestado in 2018. Then, the second phase includes image segmentation process by using "Bernsen's Thresholding Technique" in the first phase. The researcher drew a conclusion that in case of utilizing

... Show More
View Publication
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Online Journal Of Veterinary Research
Article review: Infections by gram + bacteria in laboratory mice
...Show More Authors

Publication Date
Sat Aug 01 2020
Journal Name
Journal Of Engineering
Salt Distribution in a Soil Irrigated by Subsurface Emitter
...Show More Authors

The best design of subsurface trickle irrigation systems requires knowledge of water and salt distribution patterns around the emitters that match the root extraction and minimize water losses. The transient distribution of water and salt in a two-dimensional homogeneous Iraqi soil domain under subsurface trickle irrigation with different settings of an emitter is investigated numerically using 2D-HYDRUS software. Three types of Iraqi soil were selected. The effect of altering different values of water application rate and initial soil water content was investigated in the developed model. The coefficient of correlation (R2) and the root-mean-square error (RMSE) was used to validate the predicted numerical res

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of The College Of Languages (jcl)
El porqué de la confusión entre el pretérito indefinido y el imperfecto en la lengua española para alumnos de Irak The reason of confusion between past perfect and imperfect in Spanish for Iraqi students
...Show More Authors

Las diferencias entre el pretérito perfecto simple y el imperfecto son uno de los temas más complejos de la lengua española, no sólo para el estudiante, sino para el profesor, puesto que sistematizar los casos y hacerlos fácilmente comprensibles al alumno es tarea difícil. Los profesores de lengua, cuyas investigaciones han dado lugar a una serie de teorías y de corrientes metodológicas y didácticas que permiten enfocar la enseñanza de una lengua extranjera de manera muy distinta a como se hacía tradicionalmente. Vamos a repasar muy brevemente cuáles son estas teorías.

En primer lugar es necesario señalar en qué consiste el aprendizaje de una segunda lengua:

"El aprendizaje de una segunda lengua (L2) es el

... Show More
View Publication
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Dry Canal in Iraq and Mutual Growth in International Economic Environment
...Show More Authors

In this paper, an attempt was made to measure and interpret the impact of several variables on global maritime transport, including: OECD industrial productions, high growth rates of some developing countries, and growth in world GDP. These variables contribute to higher rates of maritime transport revenues of 800 billion dollars annually; in the form of numerical sequences. The dry canal in Iraq was assumed to transfer 99 million tons of goods annually. This was made sure through the economic feasibility of the difference between maritime and land transport through railways. The effect of geographical and anthropological nature of Iraq on this project was studied too. Our findings indicated that the project will not drive growth

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 22 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Mechanism of Using of Income Tax in Achievable of Economic Targets in Iraq
...Show More Authors

The present study is concerned with the role of income tax in implementing economic goals in Iraq and treating the problems and pitfalls in the Iraq economy.

The study also aims at investigating the role of income tax in attracting promising favorite effects into economy.

The study was performed on data covering the period (2003 - 2012) with respect to the variables of (income tax, oil profits) as independent variables and (private consuming expenditure, private investmental expenditure, and standard figure of prices) as dependent variables. To analyze these data, a number of statistical descriptive and analytical techniques were used such as (percentage, standard variance, mediums, F test, T test and SPSS). It has been c

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Global Pharma Technology
Calculation of Stabilization Energy of Tetrahedrane with its Nitrogen Substituted Derivatives by DFT Method and Driving an Empirical Relation Connect it with Charge Functions of the Molecule
...Show More Authors

In this work the strain energy of tetrahedrane and its nitrogen substituted molecules were calculated by isodesmic reaction method according to DFT quantum chemical fashion, the used basis set was 6-31G/B3-LYP, in addition all structures were optimized by RM1 semi-empirical method. From the obtained data we estimate an empirical equation connect between strain energy of the molecule with charge functions represented by dipole moment of the molecule plus accumulated charge density involved within the tetrahedron frame plus the number of nitrogen atoms. The results indicate the charge spreading factors by polarization and processes are the most important factors in decreasing the strain energy.

Preview PDF