Post-structural critical studies highlighted the importance of studying the texts surrounding the text as an important part in the process of receiving and understanding texts, and although this topic was dealt with by the ancient Arabs and Europeans, interest in it appeared clearly after the appearance of Gerard Genet's book (SEUILS), which separated it Text Thresholds. Or what he called paratexte, and dealt with them with interest as he reads them on books. With the development of semiotic studies, interest in paratexte studies began in a broader way and in various literary and non-literary texts, including journalistic texts. And since specialized magazines are one of the press releases that enjoy their privacy in terms of topics and
... Show MoreAbstract
In this paper, fatigue damage accumulation were studied using many methods i.e.Corton-Dalon (CD),Corton-Dalon-Marsh(CDM), new non-linear model and experimental method. The prediction of fatigue lifetimes based on the two classical methods, Corton-Dalon (CD)andCorton-Dalon-Marsh (CDM), are uneconomic and non-conservative respectively. However satisfactory predictions were obtained by applying the proposed non-linear model (present model) for medium carbon steel compared with experimental work. Many shortcomings of the two classical methods are related to their inability to take into account the surface treatment effect as shot peening. It is clear that the new model shows that a much better and cons
... Show MoreIn this paper, a mathematical model consisting of a prey-predator system incorporating infectious disease in the prey has been proposed and analyzed. It is assumed that the predator preys upon the nonrefugees prey only according to the modified Holling type-II functional response. There is a harvesting process from the predator. The existence and uniqueness of the solution in addition to their bounded are discussed. The stability analysis of the model around all possible equilibrium points is investigated. The persistence conditions of the system are established. Local bifurcation analysis in view of the Sotomayor theorem is carried out. Numerical simulation has been applied to investigate the global dynamics and specify the effect
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreEvery so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph
... Show MoreProblem: Cancer is regarded as one of the world's deadliest diseases. Machine learning and its new branch (deep learning) algorithms can facilitate the way of dealing with cancer, especially in the field of cancer prevention and detection. Traditional ways of analyzing cancer data have their limits, and cancer data is growing quickly. This makes it possible for deep learning to move forward with its powerful abilities to analyze and process cancer data. Aims: In the current study, a deep-learning medical support system for the prediction of lung cancer is presented. Methods: The study uses three different deep learning models (EfficientNetB3, ResNet50 and ResNet101) with the transfer learning concept. The three models are trained using a
... Show MoreThe spectacular film is a type of feature films which has specific elements that contribute in increasing the aesthetics of the shape in its structure. The researcher started studying this type of films by researching the spectacular film concept, the history of its development, who are its most important stars and then tackling the Indian cinema represented by Bollywood, which is considered a school for this type of film. The researcher addressed the most important influential elements that entre in its production as well as studying these elements that contribute to building the shape including the configuration, movements of cameras, lenses, the lighting, colors, costumes etc. and what influence they have in forming a special aestheti
... Show MoreThis study is concerned with the concept of offering a point of view as a narrative construction element, especially the element and point of view of the novel to the letter Alcinmatugrave both business taken from masterpieces and literary works in the foundation or set of cinema. On the whole, the narrator participate in mock narrative process and support the narrator visual image, especially stories that need to exist scenes prove added to the image that uses signs of reality to take those marks a new dimension not only across the image, but also the intervention of the narrator in the re-formation of this realism marks surrounding Palms perceived and visible and put markers regularly between what the narrative of privacy and image, fo
... Show MoreGod Almighty put in his great book secrets that do not end, and wonders that do not expire, for he is the one from which the scholars are not satisfied, and he does not create due to the multitude of response, and it is the comprehensive and inhibitory book that God conceals to the worlds, and he challenged the two heavyweights to come up with something like it.
At all times, issues arise in the Noble Qur’an that fit the needs of the people of that time and their culture, for it is an eternal book, characterized by the ability to give, extend and respond to addressing the problems of the age and its variables, when the Arabs had little luck at the time of the message’s descent from the scientific culture, and their proficienc
... Show More