Lynn Nottage's Ruined, a Pulitzer Prize play, tackles the plight of women’s survival during the civil war in the Democratic Republic of Congo. The play is a loud scream for the whole world to view the physical violence of women and hear their traumatic memories, hoping that this attempt might save them from their disastrous lives resulting from the brutalities of civil war. In this play, women are portrayed beyond victims of the political and armed conflicts as they serve as a reflection of a serious issue that threatens the human race in general: the continuing dehumanization whereby women are considered minorities and the “others,” even within their own society. By applying a critical analysis technique, the current paper aims to shed light on women's experience of their violated bodies and their unspeakable suffering in the context of their trauma.
Three mesoporous silica with different functional group were prepared by one-step synthesis based on the simultaneous hydrolysis and condensation of sodium silicate with organo - silane in the presence of template surfactant polydimethylsiloxane - polyethyleneoxide (PDMS - PEO). The prepared materials were characterized by Fourier transform infrared spectroscopy (FTIR), thermogravimetric analysis (TGA), atomic force microscopy (AFM) and nitrogen adsorption/desorption experiments. The results indicate that the preparation of methyl and phenyl functionalized silica were successful and the mass of methyl and phenyl groups bonded to the silica structure are 15, 38 mmol per gram silica. The average diameter of the silica particles are 103.51,
... Show MoreThe purpose of my thesis is to synthesis two new bidentate ligands which were used to prepare series of metal complexes by reacting the ligands with (M+2 = Mn, Co, Ni, Cu, Cd and Hg) Succinyl chloride was used as starting material to synthesis two bidentate ligands (L1) and (L2) by reaction it with 4-chloroaniline (L1) and (4-aminoacetophenone) (L2) in dichloromethane as a solvent, that are: (L1) = N1,N4-bis (4-chloro phenyl ) succinamide (L2) =N1,N4-bis(4-acetylphenyl)succinamide The new ligands were characterize by using spectroscopic study (Fourier-transform infrared spectroscopy (FT-IR), electronic spectra ( UV-Vis) ,nuclear magnetic resonance(1H,13C-NMR), Mass spectra
... Show MoreAbstract
This research aims to improve the provided health service level inside Baghdad hospitals and the Yarmouk educational, as well as to shed light on the reality of the health service and the quality within the major operations room in both hospitals, as the operations room represent the research community, as was the use of some quality tools Pareto and Ishikawa diagram to measure and assess the level of quality provided, and include research problem to find out what are the problems and obstacles facing the process of improving quality in both hospitals, and whether there are scientifically accurate method to assess the quality of health service in Baghdad's Yarmouk hospital and educational . Where the researcher h
... Show MoreThis research deals with the financial reporting for non-current assets impairment from the viewpoint of international accounting standards, particularly IAS 36 "Impairment of non-current assets." The research problems focus on the presence of internal and external indicators on impairment of non-current assets in many of companies listed in Iraqi stock exchange. So it is required to apply IAS 36 to reporting for the impairment loss of assets since this impairment impact certain financial indicators. These indicators help users in their decision-making and forecasting future financial situation and the ability of the company to achieve future profits or maintain current profits. The research aims to shedding lig
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More