Alice Walker's novel The Color Purple1983, whose events take place in the rural Georgia and addresses the most important issues in the early 20thcentury; like male dominant society and women submission to men, weaves a mosaic picture of male-female relationships. Black men like Alphonso, Albert and Harpo are portrayed as oppressors, cruel and they exercise power and violence over their wives and daughters. Through the negative portrayal of black male characters, Walker is accused to be a men hating writer because she ''Views oppression as an essentially masculine activity which springs from the male's aggressive need to dominate. In the novel, man is the premium mobile, the one by whom and t
... Show MoreGravity and magnetic data were used to study the deep crustal structures in Karbala and surrounding areas in central Iraq. The space window method was used to separate the residual from regional anomalies of gravity and magnetic data, the spaces of window are equal to 48,36 and 24 km. The Total Horizontal Derivative (THD) techniques and local wavenumber of gravity and magnetic are used to identify the faults and their trends with the basement rocks. The N45W, N45E, N-S and rarely E-W trends of faults are detected in the basement rock. It is believed that some of these faults extending from the basement to the uppermost layer of the sedimentary rocks.
It is found in the book "Ibn Aqeel: Alfiya Ibn Malek" that there are some linqustical aspected are related to the native tribal speakers like Tamim or Tie or some others. Sometimes in the book he said "some Arabian said without mentioning the name of the tribe.
As weel, he hasn’t mentioned the accent but he does mention the language. In the book, he has brought back the most important and the biqqest Arabian tribes suchas tribes of Hegaz, Tamim, Hatheyal, son of Anber, Tie, Rabia Bin Wael, Bani Katham, Au there, Bani AL Harth, Bani Kalb, Bani Hgim, Zabid, Hamedan, Alia Qais, Bani Ameer and many others. However, the most mentioned tribes were Hegaz and Tami.
Hence, the importance of the book expiain Ibn Aqeel by mentioning these A
Congenital distal vaginal obstruction is usually asymptomatic in a newborn female. On rare occasions, it may present as an acute emergency with life threatening complications.This paper is reporting the rare condition of two newborn females presenting urgently with abdominal distension and acute urinary retention as a result of congenital distal vaginal Obstruction. The case history and urgent management shall be presented and both conditions shall be discussed.
The study aims detection teaching modalities adopted relationship in Jerash University exactly the classroom, and to achieve the goal of the study was to develop a questionnaire consisting of (39) items, and was achieving validity and reliability have, then sent to a sample of professors made up the university from (122) university professor of the total (172) professor, and they study population.
Study found a relationship between the teaching methods of the four their strategies with classroom management, and as a result the overall average level, while Hspt critical thinking at the highest correlation with classroom discipline management relationship strategy, while the relatio
... Show MoreCriteria to be met in selecting the obtimal areas for generating alternative electric energy from wind
There is a great risk of cardiovascular disease (CVD) and vascular thrombosis in patients with End-Stage Renal Disease (ESRD). These patients exhibit numerous abnormalities in coagulation, fibrinolytic, inhibitory protein abnormalities in multiple levels. The study aimed to assess hypercoagulable changes by measuring the levels of antithrombin, plasma fibrinogen and FXII activity in patients with ESRD, and to find their correlation with Hemoglobin (Hb) level, WBC count, reticulocyte percentage and platelet count. This study was conducted at Al-Hayat center, Al Karama Teaching Hospital on 50 ESRD patients aged < 60 years of both genders. In addition, 20 apparently healthy individuals were included as a control group. The mean Hb level, total
... Show MoreThe dye–semiconductor interface between N749 sensitized and zinc semiconductor (ZnSe) has been investigated and studied according to quantum transition theory with focusing on the electron transfer processes from the N749 sensitized (donor) to the ZnSe semiconductor (acceptor). The electron transfer rate constant and the orientation energy were studied and evaluated depended on the polarity of solvents according to refractive index and dielectric constant coefficient of solvents and ZnSe semiconductor. Attention focusing on the influence of orientation energies on the behavior of electron transfer rate constant. Differentdata of rate constant was discussion with orientation energy and effective driving energy for N749-ZnSe system.
... Show MoreThis research is an attempt to study aspects of syntactic deviation in AbdulWahhab Al-Bayyati with reference to English. It reviews this phenomenon from an extra-linguistic viewpoint. It adopts a functional approach depending on the stipulates of systemic Functional Grammar as developed by M.A.K. Halliday and others adopting this approach. Within related perspective, fairly’s taxonomy (1975) has been chosen to analyze the types of syntactic deviation because it has been found suitable and relevant to describe this phenomenon. The research hypothesizes that syntactic deviation is pervasive in Arabic poetry, in general and in Abdul-Wahhab Al-Bayyati Poetry in specific, and can be analyzed in the light of systemic Functional Grammar
... Show MoreThe hiding of information has become of great importance in recent times. With dissemination through the internet, and communication through satellites, information needs to be secure. Therefore, a new algorithm is proposed that enables secret messages to be embedded inside satellite images, wherein images of any size or format can be hidden, using a system’s image compression techniques. This operation is executed in three main steps: first phase – the original image is converted into a raster image; second phase– steganography, in which a binary secret message is hidden inside a raster image, using a 4×4 array as the secret key; and third phase– compre
... Show More