Preferred Language
Articles
/
7RfXuY8BVTCNdQwCzXyh
Patriarchy, and Colonialism in Ama Ata Aidoo's Anowa : A Feminist Approach
...Show More Authors

Abstract The research investigates in detail the fascinating story of its title character, which may work as an allegory for Africa itself in its past. Ama Ata Aidoo is miscellaneous writers who wrote in different literary genre like drama , short stories novel and , poetry and criticism . She is also an active feminist. Aidoo is against the colonial practice and its influence on African minds. Aidoo's play Anowa confronts painful issues in Africa's past, mostly those of the slave trade. She goes further to tackle issues of patriarchal domination and African feminism, like the relationships between individuals and society, women and motherhood, men and women, husbands and wives, mothers and daughters, and above all the future invasion of ancient traditions. Anowa is an exciting play full of deep questions.

Publication Date
Sat Dec 21 2024
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
mRNA Approach Image Encryption Using LUC Algorithm
...Show More Authors

      Bioinformatics is one of the computer science and biology sub-subjects concerned with the processes applied to biological data, such as gathering, processing, storing, and analyzing it. Biological data (ribonucleic acid (RNA), deoxyribonucleic acid (DNA), and protein sequences) has many applications and uses in many fields (data security, data segmentation, feature extraction, etc.). DNA sequences are used in the cryptography field, using the properties of biomolecules as the carriers of the data. Messenger RNA (mRNA) is a single strand used to make proteins containing genetic information. The information recorded from DNA also carries messages from DNA to ribosomes in the cytosol. In this paper, a new encryption technique bas

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Dec 08 2023
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

Intrusion-detection systems (IDSs) aim at detecting attacks against computer systems and networks or, in general, against information systems. Most of the diseases in human body are discovered through Deoxyribonucleic Acid (DNA) investigations. In this paper, the DNA sequence is utilized for intrusion detection by proposing an approach to detect attacks in network. The proposed approach is a misuse intrusion detection that consists of three stages. First, a DNA sequence for a network traffic taken from Knowledge Discovery and Data mining (KDD Cup 99) is generated. Then, Teiresias algorithm, which is used to detect sequences in human DNA and assist researchers in decoding the human genome, is used to discover the Shortest Tandem Repeat (S

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
New Approach for Solving Multi – Objective Problems
...Show More Authors

  There are many researches deals with constructing an efficient solutions for real problem having Multi - objective confronted with each others. In this paper we construct a decision for Multi – objectives based on building a mathematical model formulating a unique objective function by combining the confronted objectives functions. Also we are presented some theories concerning this problem. Areal application problem has been presented to show the efficiency of the performance of our model and the method. Finally we obtained some results by randomly generating some problems.

View Publication Preview PDF
Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
New Approach for Calculate Exponential Integral Function
...Show More Authors

     This manuscript presents a new approach to accurately calculating exponential integral function that arises in many applications such as contamination, groundwater flow, hydrological problems and mathematical physics. The calculation is obtained with easily computed components without any restrictive assumptions

     A detailed comparison of the execution times is performed. The calculated results by the suggested approach are better and faster accuracy convergence than those calculated by other methods. Error analysis of the calculations is studied using the absolute error and high convergence is achieved. The suggested approach out-performs all previous methods  used to calculate this function and this decision is

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Organization, Technology And Management In Construction: An International Journal
Using the ordinal priority approach for selecting the contractor in construction projects
...Show More Authors
Abstract<p>Effective decision-making process is the basis for successfully solving any engineering problem. Many decisions taken in the construction projects differ in their nature due to the complex nature of the construction projects. One of the most crucial decisions that might result in numerous issues over the course of a construction project is the selection of the contractor. This study aims to use the ordinal priority approach (OPA) for the contractor selection process in the construction industry. The proposed model involves two computer programs; the first of these will be used to evaluate the decision-makers/experts in the construction projects, while the second will be used to formul</p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2019
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Bulk binding approach for PMIPv6 protocol to reduce handoff latency in IoT
...Show More Authors

<p>Mobility management protocols are very essential in the new research area of Internet of Things (IoT) as the static attributes of nodes are no longer dominant in the current environment. Proxy MIPv6 (PMIPv6) protocol is a network-based mobility management protocol, where the mobility process is relied on the network entities, named, Mobile Access Gateways (MAGs) and Local Mobility Anchor (LMA). PMIPv6 is considered as the most suitable mobility protocol for WSN as it relieves the sensor nodes from participating in the mobility signaling. However, in PMIPv6, a separate signaling is required for each mobile node (MN) registration, which may increase the network signaling overhead and lead to increase the total handoff latency

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Diagnostic Approach of Atypical Cells in Effusion Cytology Using Computerized Image Analysis
...Show More Authors

Background: Cytology is one of the important diagnostic tests done on effusion fluid. It can detect malignant cells in up to 60% of malignant cases. The most important benign cell present in these effusions is the mesothelial cell. Mesothelial atypia can be striking andmay simulate metastatic carcinoma. Many clinical conditions may produce such a reactive atypical cells as in anemia,SLE, liver cirrhosis and many other conditions. Recently many studies showed the value of computerized image analysis in differentiating atypical cells from malignant adenocarcinoma cells in effusion smears. Other studies support the reliability of the quantitative analysisand morphometric features and proved that they are objective prognostic indices. Method

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
Al–bahith Al–a'alami
The Absence of the Applied Semiotic Approach in Analyzing the Media Phenomenon
...Show More Authors

the contemporary Arab scholars deal with semiotics as an approach that helps them understand the texts, its meaning, and its structural functionalism . that’s why every now and then we find some
studies and researches using semiotics as an approach in study and comparatives, some of them even used the semiotic approach in analyzing old and new texts, while others think that semiotic holds and important place in critical approaches .
even though some of them considers semiotic just a trend of fashion this really didn’t lessen the value of semiotic as a scientific and procedural approach in literary and media studies as well as in analyzing literary and journalistic texts. for this reason it is considered as an important approa

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 31 2024
Journal Name
Iraqi Geological Journal
Permeability Prediction and Facies Distribution for Yamama Reservoir in Faihaa Oil Field: Role of Machine Learning and Cluster Analysis Approach
...Show More Authors

Empirical and statistical methodologies have been established to acquire accurate permeability identification and reservoir characterization, based on the rock type and reservoir performance. The identification of rock facies is usually done by either using core analysis to visually interpret lithofacies or indirectly based on well-log data. The use of well-log data for traditional facies prediction is characterized by uncertainties and can be time-consuming, particularly when working with large datasets. Thus, Machine Learning can be used to predict patterns more efficiently when applied to large data. Taking into account the electrofacies distribution, this work was conducted to predict permeability for the four wells, FH1, FH2, F

... Show More
View Publication
Scopus Crossref