Preferred Language
Articles
/
jcolang-680
The Broken Wings: The character of the Arab Christian |Woman in Sami Michael's Novel "Trumpet in the Wadi" versus "Jasmine" by Eli Amir: הכנפיים שנשברו דמות האישה הערבית הנוצרית ברומן " חוצוצרה בוואדי " של סמי מיכאל לעומת דמותה ב " יסמין " של אלי עמיר
...Show More Authors

Sami Michael and Eli Amir - two Israeli writers born in Iraq and of the same generation (Sami Makhail was born in Baghdad in 1926 and Eli Amir in 1937). They wrote in their novels, among other things, about Orientalism , love and femininity. They both lived wild, extroverted lives. They did not shy away from experiencing anything new that came their way, rebelled against conventions and acted provocatively; they enjoyed the shock and amazement that evoked around them. While trying to find their place in different family settings, they chose to present two Arab Christian heroines. The narrator in Jasmine is the speaker Noori-Eli himself. While the narrator of “Trumpet in the Wadi” is Huda the heroine herself. Both are independent and both have a hobby in which they invest a lot; which is reading.

 The families of the two protagonists undergo social changes during the plot, and when necessary they both work to provide the family needs. First, the study sheds light on the importance of the Arabs in Israeli literature as reflected in Sami Michael's book: "Trumpet in the Wadi" "(2008) and Eli Amir's: Jasmine (2005).  It, also, provides summaries of the two novels and discusses the character of the Arabic Christian woman as described in both novels.

Chapter two debates the characters of Huda and Jasmine and similarities of the two in representing their time. The chapter also compares the recurring image of the Christian Arab character in the two novels, the concept of racism, characters description, as well as the subjects discussed throughout the books with an number of citation taken from the book.

תקציר

סמי מיכאל ואילי עמיר - שני סופרים ישראליים ילידי עיראק ובני אותו דור (סמי מכאיל נולד בבגדד בשנת 1926 ואלי עמיר ב-1937). כתבו ברומניהם, בין השאר, על המזרחיות ועל האהבה ונשיות.ושניהם חיו חיים פרועים, מוחצנים. לא נרתעו מהתנסות בכל דבר חדש שנקרה בדרכם, מרדו במוסכמות ונהג באופן פרובוקטיבי, הם נהנו מהזעזוע והתדהמה, שהם מעוררים סביבם. מנסים למצוא את מקומם במסגרות משפחתיות שונות, לכן הם בחרו להציג שתי גבורות ערביות .ושתי הגיבורות הן בחורות נוצריות ערביות והן והדובר ברומן "יסמין" הוא דובר- בגוף ראשון , ב"חצוצרה בוואדי" הדוברת היא הודא הגיבורת , אך ביסמין הדובר הוא נורי – אלי עצמו. שניהם עצמאיים ולשניהם יש תחביב שהם משקיעים בו רבות; הקריאה. המשפחות של שתי הגיבורים עוברות שינויים חברתיים במהלך העלילה, ובשעת הצורך שניהן עובדות  לממן צרכים שהמשפחה אינה יכולה לממן. ברומנם במחקר זה ואתעניין בספרם של סמי מיכאל: "חצוצרה בוואדי"" (2008) ובין ספרו של אלי עמיר: יסמין( 2005). מחקר זה מבקש לבדוק כיצד מצטיירת דמותה של האישה הערבית הנוצרית בשני רומנים מפורסמים של השניים . תחילה אתייחס למקומו של הערבי בספרות הישראלית ,  ואציג את תמצית שני הרמנים עם חיי הסופרים, ואדון בדמות האישה ודרכי איפיונה בהסתמך על ספרות תיאורטית.     
בפרק השיני אתעניין לדמותיוהן של הודא ויסמין כמייצגות את התקופה, ולבחון את הקווים הבולטים בדרכי עיצובה. ,ואשווה בין הדמות הערבית הנוצרית החוזרת בשני הרומנים, ואבדוק מהי עמדת המוצא שלהם, כיצד הם מתארים את שתי הדמויות ובמה הם בוחרים להתמקד.מפאת תחומו המצומצם של הדיון, העיסוק בנושא יתמקד במבחר דוגמאות נבחרים מן שני הרומנים.

 

     

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of The College Of Languages (jcl)
The methods used to translate medical terms between Arabic and Spanish: Los métodos utilizados para traducir términos médicos entre árabe y español
...Show More Authors

         The present paper deals with medical terms translation and its relationship with the medical text of Arabic and Spanish. Medical translation is the process of transferring texts related to the field of health and medicine to achieve an accurate effective translation from the source language text to the equivalent target language text. The most prominent medical translations are from English to Arabic as most of the syllabuses in Arab countries are taught in English.

       Translation is an innovative work intended to render the original text in the source language into the target language with the highest level of linguistic and intellec

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (25)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Thu Oct 26 2023
Journal Name
International Journal Of Environment And Waste Management
Novel Poly (3-hydroxybutyrate) production using Bacillus subtilis NG220 and watermelon derived substrates
...Show More Authors

Poly (3-hydroxybutyrate) (PHB) is a typical microbial bio-polyester reserve material; known as “green plastics”, which produced under controlled conditions as intracellular products of the secondary metabolism of diverse gram-negative/positive bacteria and various extremophiles archaea. Although PHB has properties allowing being very attractive, it is too expensive to compete with conventional and non-biodegradable plastics. Feasibility of this research to evaluate the suitability of using a watermelon-derived media as an alternative substrate for PHB synthesis under stress conditions was examined. Results, include the most nutrients extraction, indicated that the watermelon seeds contain a high content of nutrients makes them a promisi

... Show More
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Traitement Du Signal
Optimizing Acoustic Feature Selection for Estimating Speaker Traits: A Novel Threshold-Based Approach
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Applied Pharmaceutical Science
The role of angiotensin converting enzyme (insertion)/(deletion) and angiotensin II type 1 receptor (A1166C) gene polymorphisms in antiproteinuric effect of ACE inhibitors in type 2 diabetic Iraqi patients
...Show More Authors

The angiotensin converting enzyme (ACE) I\D gene polymorphism influences the blood ACE enzyme activity. Renoprotective effect of ACE inhibitors (ACEIs) varies among patients due to genetic variation, particularly in Renin-Angiotensin-Aldosterone System genes. This study investigates the genetic variations of ACE I\D and AGT1RA1166C gene polymorphisms in the antiproteinuric effect of ACEI therapy in type 2 diabetes mellitus (T2DM) patients. This is a cross-sectional study that included 76 T2DM patients who are ACEI users, divided into two groups: T2DM without diabetic kidney disease (DKD) included 31 patients, and T2DM with DKD included 45 patients. Urine samples were taken for measurement of urine albumin and creatinine, then calcul

... Show More
View Publication
Scopus Crossref