Although tattooed literary characters are not new in literature, they are still in children’s literature. Inked characters were nearly absent from children’s books and with the dawn of the twenty first century many of them portrayed tattooed characters. The problem of the study lies in the lack of studies concerning these types of characters in children’s books. The researchers aim to study inked characters in selected stories for children to show the different literary uses of tattoos in these stories, serving not only characterization but theme and symbolism as well. Two children's stories are selected for this study: Tell Me A Tattoo Story (2016) by Alison McGhee and My Teacher Has Tattoos (2023) by Darren Lopez. The researchers studied the role of the main characters’ tattoos in different literary elements. In Tell Me a Tattoo Story, the tattoos portray the father’s personality, beliefs, and aspirations while in My Teacher Has a Tattoo, Lopez retells his own story as a tattooed teacher and how inked people are stereotyped either as criminals or gangsters. In conclusion, characters’ physical appearance namely his/ her tattoos, play an integral role not only in developing the literary character but also serving as means for portraying many literary elements like theme, allusions, symbolism to name few.
The research seeks to identify the effectiveness of a selective program in modifying irrational thinking that causes anger among an important class of societies in general. namely teachers. Specifically female teachers because of the pressures they suffer because of the nature of this profession. It may develop into anger outburst, which may cause irrational thinking arose as a result of the different situations they are going through. The sample of the program consisted of (12) teachers in Egypt, from different educational sectors. The researcher intended to clarify the emotion of anger and the irrational thoughts associated with it and the contribution of the selective counseling program in modifying those irrational thinking. This was
... Show MoreBackground: Health professionals have a crucial role in promotion, support and management of breastfeeding. To be effective in this effort, the clinician should focus on the issue from the preconception stage through pregnancy and delivery, and continue in subsequent infant care. Aim of the study: to assess the effectiveness of the UNICEF/WHO 40-hour of breast feeding training through the assess breastfeeding knowledge and attitudes of the health profession staff before and after training course.
Drought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought. The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data. The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreFe, Co and Sb nanopowders were fruitfully prepared by electrical wire explosion method in Double distilled and de-ionized water (DDDW) media. The formation of iron, cobalt and antimony (FeCoSb) alloy nanopowder was monitored by X-ray diffraction. The x-ray diffraction pattern indicates that there are iron, cobalt and antimony peaks. Optical properties of this alloy nanoparticles were characterized by UV-Visible absorption spectra. The absorption peak position is shifted to the lower wavelengths when the current increases. That means the mean size of the nanoparticles controlled by changing the magnitude of the current. The surface morphological analysis is carried out by employing Scanning Electron Microscope (SEM). Particles with varies
... Show MoreFiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al
... Show MoreIn this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show More