Preferred Language
Articles
/
jcolang-722
Comparison between Ghassan Kanafani's Novel " Ma tabaqa lakom" and William Faulkner's "The Sound and the Fury" from the Perspective of the American School (the methodology of the novelistic theme and style): مقایسة دو رمان "ماتبقّي لكم"کنفانی و " خشم و هياهو"ی فاکنر بر اساس مكتب آمريكا (بررسی روش شناختی محتوایی و سبکی )
...Show More Authors

     Being the meeting points of the world different languages and out of a scholarly perspective, comparative literature represents a cultural leap as well as an artistic and intellectual development or a global literary movement of both prose and poetry. Such homogenous literary structure requires a systematic and coherent study of the literary output of the people different cultures and civilizations. It also represents the theoretical approach of the present study that debates a systematic comparison between Ghassan Kanafani’s All That's Left to You and William Faulkner’s. The Sound and the Fury.  Within the perspective of the descriptive analysis approach, the present paper discusses the points of similarities and differences of the two novels and explains the artistic achievements of both novelists that have always been the center of the conceptual and methodological studies for the scholars and researchers of comparative studies. The importance of the present study lies in adapting the systematic and the theoretical aspects that have deliberately or accidentally marginally been included in the previous comparative studies. One of the basic similarities of the two novels lies in the use of the poetic dictions expressed within the psychological novel pattern and described through stream of consciousness. Hence, it is necessary to approach the two works in dialogue with the American school that have always taken the interest in studying different literary genres of different cultures. Of the most important findings of the systematic studies based on theoretical aspects of comparative study of the two novels: 1. stylistically speaking, both novels follow the stream of consciousness approach but it is less obvious in Ghassan Kanafani’s novel where the effect of his shrewd style cannot be ignored. 2. Thematically speaking, Ghassan Kanafani’s creativity lies in the touch of the optimism employed rather than the pessimistic characteristics expressed in Faulkner’s novel which is the very essences of the modern psychological novel.

چكيده

ادبیات تطبیقی نه فقط نقطة تلاقی زبان ها، فرهنگ‏‏ها و ملیت‏های گوناگون بلکه به تعبیر پژوهشگران این اثر، نقطة کانونی یک خیزش فرهنگی، یک نهضت تمدنی و یک جنبش ادبی جهانی است که گاه در لباس نثر و دیگرگاه در زیور شعر خودنمایی می کند و چنین شاکله‏ای اندام‏وار، طبیعتا بررسی روش‏مند و منسجم‏تر دستاوردهای ادبی ملل مختلف  را اقتضا می کند. همین دغدغه پژوهشگران را  برآن داشت تا دو رمان "ما تبقّي لكم" غسان كنفاني و "خشم و هياهو" ويليام فاكنر را با تکیه بر روش توصیفی – تحلیلی بررسی  کنند و هم با بيان وجوه تشابه و تفاوت ميان اين دو اثر، سبك روايي و خلاقيت دو نويسنده را نشان دهند و هم پژوهشگران و دانش اندوزان حوزة ادبیات تطبیقی را با اصول روش‏شناختی پژوهش کیفی آشنا سازند. ضرورت و اهمیت پژوهش در این است که مطالعات پیشین انجام شده –خواه یا ناخواه- از بررسی روشمند و نظری در مقام مقایسة رمان‏های مورد مطالعه غافل بوده اند. دستاوردهای اصلی پژوهش اینکه وجه اشتراک اين دو رمان در به کارگيري زبانی شاعرانه و داشتن ويژگي‏هاي رمان روان‏شاختي مدرن و صبغه سیال ذهنی متبلور است و همین ویژگی ها بررسی تطبیقی با رویکرد آمریکایی را در پژوهش اقتضا می‏کند که قائل به مطالعة ادبیات در فراسوی مرزهای خاص یک کشور است . سرانجام بررسی روش‏مند دو رمان و کاوش در مطالعات پیشین، یافته ها و نتایج استواری را ارائه می دهد از جمله اینکه: 1- کنفاني با خوش‏بيني، بدبيني‏هاي موجود در رمان روان‏شاختي نو را مي‏زدايد؛ ولي فاکنر نسبت به اين امر همچنان امانت­دار بوده و روح بدبيني و ناکامي بر رمانش حکم­فرماست. 2- ويژگي‏هايِ سبكيِ جريانِ سيّالِ ذهن بر هر دو اثر حکمفرماست و در رمان کنفاني رگه‏هایی از تأثیرپذیری وجود دارد  والبته خلاقیت سبکی کنفانی امری انکارناپذیر است.  

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Dispersion in a Gas Filled Hollow Core Photonic Crystal Fiber
...Show More Authors

Hollow core photonic bandgap fibers provide a new geometry for the realization and enhancement of many nonlinear optical effects. Such fibers offer novel guidance and dispersion properties that provide an advantage over conventional fibers for various applications. Dispersion, which expresses the variation with wavelength of the guided-mode group velocity, is one of the most important properties of optical fibers. Photonic crystal fibers (PCFs) offer much larger flexibility than conventional fibers with respect to tailoring of the dispersion curve. This is partly due to the large refractive-index contrast available in the silica/air microstructures, and partly due to the possibility of making complex refractive-index structure over the fibe

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Data Mining Techniques for Iraqi Biochemical Dataset Analysis
...Show More Authors

This research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
Energy Calculation for Excited Lithium Atom in Position Space
...Show More Authors

The energy expectation values for Li and Li-like ions ( , and ) have been calculated and examined within the ground state and the excited state in position space. The partitioning technique of Hartree-Fock (H-F) has been used for existing wave functions.

View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Sun Jan 08 2023
Journal Name
Journal Of Planner And Development
Design bases for waste recycling rules in cities/ Baghdad, a case study"
...Show More Authors

Waste is one of the most important problems affecting the city’s environment and its urban landscape, which results from the activities and activities of man and the natural environment. Its sources have varied between residential, commercial, industrial, medical and hazardous, and its spread in cities, on roads and on abandoned open lands, has led to significant negative effects and risks to human health and the environment.

  Therefore, there were serious attempts to deal with waste and follow sequential steps that formed a waste management system such as (collection, sorting, transport, then treatment and disposal). Preventing and reducing waste, then recycling and recovering by composting or burning, and ending with bu

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 30 2025
Journal Name
Samarra Journal Of Engineering Science And Research
Proposed low Xilinx FPGA power consumption for recursive NOMA applied in optical visible light communication
...Show More Authors

Today the NOMA has exponential growth in the use of Optical Visible Light Communication (OVLC) due to good features such as high spectral efficiency, low BER, and flexibility. Moreover, it creates a huge demand for electronic devices with high-speed processing and data rates, which leads to more FPGA power consumption. Therefore; it is a big challenge for scientists and researchers today to recover this problem by reducing the FPGA power and size of the devices. The subject matter of this article is producing an algorithm model to reduce the power consumption of (Field Programmable Gate Array) FPGA used in the design of the Non-Orthogonal Multiple Access (NOMA) techniques applied in (OVLC) systems combined with a blue laser. However, The po

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Iraqi Journal Of Science
On Semiannahilator Supplement Submodules
...Show More Authors

Let R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes

Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Bubble Size Distribution In Gas-Liquid Dispersion Column
...Show More Authors

The present work investigates the effect of; superficial air velocities of: 1, 3, and 6 cm/s for two types of perforated distributor on hydrodynamic characteristic in a gas-liquid dispersion column of; air-water, and airaqueous-n-propanol solution. Bubble distribution, gas holdup, and power consumption are parameters take in consideration. Experimental work was carried out in perspex column of 8.5 cm inside diameter and 1.5 m height. Two types of bubble generator (perforated plate) were fixed at the bottom of the column; plate A (99 holes of 0.5 mm diameter and free area of 0.34%), plate B (20 holes of 1.5 mm diameter and free area of 0.62%). Photographic technique was used to measure the bubble parameters. The experimental results were

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 21 2026
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref