Preferred Language
Articles
/
jcolang-71
משבר הזהות במודרניזם של יהושע עיון בנובלה " שתיקה הולכת ונמשכת של משורר "* Identity crisis in modernity of Yahoshaa Study of “continuous silence of the poet"
...Show More Authors

סיכום

   המשבר הוא מצב מצוי רב בחברת המדינות אחרי המלחמות  והשינויים הגדולים במאה העשרים, ומשבר הזהות הוא ממשברי המאה העשרים שזכה בהתעניינות רבה בכל תחומי המדעים האנושיים, ומהם תחום הספרות. ובספרות העברית היה הסופר א. ב. יהושע מהסופרים החשובים שהתעניין בנושא הזהות בישות הציונית, הוא התווכח בנושא ביצירותיו, ראיוניו ורוב הכנסים התרבותיים והפוליטיים שנכח אותם, הוא השתמש באסכולה ספרותית מאופיינת בנושא המשברים, והוא סגנון המודרניזם. והנובלה "שתיקה הולכת ונמשכת של משורר" יצירה רבת המשמעות מבקרת את השכבה העילית בישות ובעולם, ומעודדת את הדור הצומח בישות שמנסה להחיות עברם לפי דעתו של יהושע. הדמות הראשית היא הדמות של האנט גבור המובס שמנסה לברוח מהמציאות שלו, הדמות המשנה שהיתה תלויה נהפכה להנהיג את האירועים אחר כן, יש עירפול רב משום שהוא אופי של היצירה המודרניסטית וגם יצירותיו של יהושע. ובסוף זכרתי חשבותה של  הנובלה והייחוד במודרניזם של יהושע, ואיך הוא השתמש במודרניזם בסיפור וגם מפרש את רעיונו בזהות כי הנושא הזה מגוון ועמוק מאד בישות הציונית.

Abstract

   The crisis  is considered as a matter that appears in the societies owing to  wars  and huge changes; the  crisis  of identity  is one of the  20th century crises that being hugely concerned with  in respect to the human sciences , definitely the literature .   In the Hebrew literature , the literary man  and intellectual man  A. B. Yahoshaa  has been considered as an outstanding figure in this respect  after establishing their entity in Palestine . Yahoshaa  has discussed this matter in his works  and his interviews  even in the political and cultural conferences  that he attended.  He used a literary school  characterized by the subject of crises  and production. The continuous silence of the poet  carries many meanings , where  the educated  criticized  in the entity  and in the world  and attributing to the newly-established generation in the entity  that tries to  call-back their past . The main character  in the text is defeated  and conquered, and endeavors to escape away from his reality, while the sub-character  has  been led at the first time , but later it has led the events . The ambiguity   has swept  the  productions of Yahoshaa . In conclusion,  characterizations in his  works   make his production outstanding  and how he employed  such aspects  for discussing his thought about the identity  since latter has been considered an essential  subject  in the Zionist Entity.

View Publication
Publication Date
Tue Jun 14 2016
Journal Name
Transactions Of The Asabe
Using Terahertz Time-Domain Spectroscopy to Discriminate among Water Contamination Levels in Diesel Engine Oil
...Show More Authors

View Publication
Scopus (34)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Sun May 27 2018
Journal Name
Journal Of Advanced Transportation
Accident Management System Based on Vehicular Network for an Intelligent Transportation System in Urban Environments
...Show More Authors

As cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie

... Show More
View Publication Preview PDF
Scopus (45)
Crossref (31)
Scopus Clarivate Crossref
Publication Date
Sat Mar 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Potential and Current Distribution in Flow Through Porous Electrochemical Reactor Working under Limiting Current Conditions
...Show More Authors

View Publication Preview PDF
Publication Date
Mon Mar 23 2020
Journal Name
Journal Of Engineering
Diagnosing Water Problem for Asmari Reservoir in Abu Ghirab Oilfield Using Analytical and Numerical Approaches
...Show More Authors

Asmari is the main productive reservoir in Abu Ghirab oilfield in the south-east part of Iraq. It has history production extends from 1976 up to now with several close periods. Recently, the reservoir suffers some problems in production, which are abstracted as water production rising with oil production declining in most wells. The water problem type of the field and wells is identified by using Chan's diagnostic plots (water oil ratio (WOR) and derivative water oil ratio (WOR') against time). The analytical results show that water problem is caused by the channeling due to high permeability zones, high water saturation zones, and faults or fracturing. The numerical approach is also used to study the water movement insi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Aip Conference Proceedings
Highly-charged EDTA-2Na salt as a novel draw solution in pressure-retarded Osmosis process
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu Sep 01 2016
Journal Name
Radiology Case Reports
Intralobar pulmonary sequestration in elderly woman: a rare case report with emphasis on imaging findings
...Show More Authors

View Publication
Scopus (8)
Crossref (10)
Scopus Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Sensors
WDARS: A Weighted Data Aggregation Routing Strategy with Minimum Link Cost in Event-Driven WSNs
...Show More Authors

Realizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost

... Show More
View Publication Preview PDF
Scopus (36)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Jan 28 2019
Journal Name
Soft Computing
Bio-inspired multi-objective algorithms for connected set K-covers problem in wireless sensor networks
...Show More Authors

Scopus (13)
Crossref (12)
Scopus Clarivate Crossref