يحاول البحث دراسة رواية الكاتب الاميركي جوزيف هيلر التي تحمل عنوان "كاتش 22" (1961). وفي تفحص دقيق لمحتويات الرواية نجد ان تركيزها الرئيس هو المشاعر المناهضة للروح العسكرية. ويقدم البحث شخصيات مختلفة في الرواية ويحاول ان يعكس من خلالها المشاعر المناهضة للروح العسكرية. وان البحث ناقش ايضاً تأثيرات التصرفات الخاصة والاحداث الرئيسة التي حدثت في القوة الجوية الاميركية. وتدور القصة بشكل رئيس حول بعض رجال القوة الجوية الذين كانوا مقاتلين في الحرب العالمية الثانية. وتسلط الاحداث التي يناقشها البحث الضوء على المشاعر التي تحملها المفاهيم المناهضة للروح العسكرية تجاه قضايا الحرب. ان حبكة الرواية متسلسلة وان وصف الاحداث جاء بشكل هزلي كوميدي. وتمثل الشخصيات في الرواية الخصائص المتنوعة التي يمكن ان تستعمل لتطوير حبكة ما مناهضة ايضاً للروح العسكرية. ويستند البحث في مجمله على مفاهيم القوات المسلحة التي تستلزم وتبرر ظهور المشاعر المناهضة للروح العسكرية وتطويرها. وان افكر الاشتراكي يعد مفهوماً بارزاً للمشاعر المناهضة للروح العسكرية في الوقت الذي تبدو فيه الروح العسكرية تحاول ان تتكيف مع الرأسمالية. ومن وجهة نظر مناهضة للروح العسكرية، فان الرأسمالية يمكن تشخصيها على انها نوع من البيروقراطية التي تحبط من عزيمة الجنود وتعزز الروح الفردية قي داخل القوات المسلحة. وتتعامل رواية "كاتش 22" مع جميع العوامل العسكرية والعوامل المناهضة للعسكرية والاحداث التي ادت الى المفاهيم نفسها.
The problem of rebellion is considered one of the features of rapid changes that a society undergoes in all spheres and directions of life, especially in the realm of social relations, customs, traditions, values, and principles. Rebellion may manifest itself in rebellion against oneself, against values or traditions, or against social or governmental authority. One may find that submission plays a vital role in all of these interactions. This study deals with the problem of rebellion in the works of two renowned authors: The French Gustave Flaubert and the Israeli Amos Oz, through two main characters who share similar qualities and traits. Emma Bovary and Henna Konin demonstrate this through their rebellion against themselves, their relati
... Show MoreUsing sodium4-((4,5-diphenyl-imidazol-2-yl)diazenyl)-3-hydroxynaphthalene-1-sulfonate (SDPIHN) as a chromogenic reagent in presence of non-ionic surfactant (Triton x-100) to estimate the chromium(III) ion if the wavelength of this reagent 463 nm to form a dark greenish-brown complex in wavelength 586 nm at pH=10,the complex was stable for longer than 24 hours. Beer's low, molar absorptivity 0.244×104L.mol-1.cm-1, and Sandal's sensitivity 0.021 µg/cm2 are all observed in the concentration range 1-11 µg/mL. The limits of detection (LOD) and limit of quantification (LOQ), respectively, were 0.117 µg/mL and 0.385µg/mL. (mole ratio technique, job's method) were employed to
... Show MoreThe purpose of this study was to find out the connection between the water parameters that were examined in the laboratory and the water index acquired from the examination of the satellite image of the study area. This was accomplished by analysing the Landsat-8 satellite picture results as well as the geographic information system (GIS). The primary goal of this study is to develop a model for the chemical and physical characteristics of the Al-Abbasia River in Al-Najaf Al-Ashraf Governorate. The water parameters employed in this investigation are as follows: (PH, EC, TDS, TSS, Na, Mg, K, SO4, Cl, and NO3). To collect the samples, ten sampling locations were identified, and the satellite image was obtained on the
... Show MoreLas diferencias entre el pretérito perfecto simple y el imperfecto son uno de los temas más complejos de la lengua española, no sólo para el estudiante, sino para el profesor, puesto que sistematizar los casos y hacerlos fácilmente comprensibles al alumno es tarea difícil. Los profesores de lengua, cuyas investigaciones han dado lugar a una serie de teorías y de corrientes metodológicas y didácticas que permiten enfocar la enseñanza de una lengua extranjera de manera muy distinta a como se hacía tradicionalmente. Vamos a repasar muy brevemente cuáles son estas teorías.
En primer lugar es necesario señalar en qué consiste el aprendizaje de una segunda lengua:
"El aprendizaje de una segunda lengua (L2) es el
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show MoreAim: The current study was aimed to determine the relationship between the orthodontic force applied by monobloc and the salivary level of alkaline phosphatase (ALP) and lactate dehydrogenase (LDH) enzymes, considering the time factor after insertion of the appliance and whether there is a correlation between these enzymes. Materials and methods: A sample of 28 growing patients requiring orthodontic treatment with myofunctional appliance (Monoblock) was taken for the current study with an age range 9 to 12 years,all patients had Angle's class II division 1 malocclusion with no or mild crowding, the sample was selected using simple random sampling. Only 16 subjects (10 males and 6 females) were included who follow certain inclusion criteria.
... Show MoreRecent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the
... Show MoreThe performance of a solar assisted desiccant cooling system for a meeting-hall located in the College of Engineering/University of Baghdad was evaluated theoretically. The system was composed of four components; a solar air heater, a desiccant dehumidifier, a heat exchanger and an evaporative cooler. A computer simulation was developed by using MATLAB to assess the effect of various design and operating conditions on the performance of the system and its components. The actual weather data on recommended days were used to assess the load variation and the system performance during those days. The radiant time series method (RTS) was used to evaluate the hourly variation of the cooling load. Four operation modes were employed for perform
... Show MoreStaphylococcus Sp.is the most common type of bacteria found in contamination place, we design this
study to compare the contamination accident between two hospitals in Baghdad.One of them isthe Burns
Specialist Hospital in the Medical CityinRusafa and another one is Al-Karama Hospital in Karkh. The
samples were collected fromOperativeWard No1 (OW1), Operative Ward No2 (OW2), Consulting Pharmacy
(CP), Emergency Room (ER), Reception Room (RR), Women's Ward (WW) and Men's Ward (MW).The
samples were taken from inside each clinical unit, surfaces, food, and air. The results showed that the
number of samples containing Staphylococcus sp. bacteria is 81, including 45 belonging to Al-Karama Burns
Ward Ho