Preferred Language
Articles
/
7RfXuY8BVTCNdQwCzXyh
Patriarchy, and Colonialism in Ama Ata Aidoo's Anowa : A Feminist Approach
...Show More Authors

Abstract The research investigates in detail the fascinating story of its title character, which may work as an allegory for Africa itself in its past. Ama Ata Aidoo is miscellaneous writers who wrote in different literary genre like drama , short stories novel and , poetry and criticism . She is also an active feminist. Aidoo is against the colonial practice and its influence on African minds. Aidoo's play Anowa confronts painful issues in Africa's past, mostly those of the slave trade. She goes further to tackle issues of patriarchal domination and African feminism, like the relationships between individuals and society, women and motherhood, men and women, husbands and wives, mothers and daughters, and above all the future invasion of ancient traditions. Anowa is an exciting play full of deep questions.

Publication Date
Sun Mar 01 2020
Journal Name
Sustainable Chemistry And Pharmacy
A sustainable approach to utilize olive pips for the sorption of lead ions: Numerical modeling with aid of artificial neural network
...Show More Authors

Scopus (23)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Sun Oct 22 2023
Journal Name
Iraqi Journal Of Science
A New Approach for the Turbidimetric Determination of Hydronium ion by Using Homemade Linear Array Ayah 5SX1-T-1D-CFI Analyser
...Show More Authors

A new Turbidimetric method characterized by simplicity, accuracy and speed for determination of Hydronium ion by continuous flow injection analysis. The method was based on the formation of complex Zn3[Fe(CN)6] for Zinc(II) that was eluted by Hydronium ion from cation exchanger column with Potassium hexacyanoferrate(III) for the formation of a pale yellow precipitate and this precipitate was determined using homemade Linear Array Ayah-5SX1-T-1D continuous flow injection analyser. The optimum parameters were 2.7 mL.min-1 flow rate using H2O as a carrier stream, 1.7 mL.min-1 reagent stream, 110 L sample volume and open valve for the purge of the sample segment. Data treatment shows that linear range 0.01-0.1 mol.L-1 for each acids (HClO

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of The College Of Basic Education
Solving Job-Shop Scheduling Problem Using Genetic Algorithm Approach
...Show More Authors

Publication Date
Sat Oct 01 2016
Journal Name
2016 2nd International Conference On Science In Information Technology (icsitech)
Cloud computing sensitive data protection using multi layered approach
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More
Publication Date
Sun Dec 12 2010
Journal Name
Alustath Journal For Human And Social Sciences
Suggested Approach to deal with Multicollinearity Problem – with Application –
...Show More Authors

This research introduce a study with application on Principal Component Regression obtained from some of the explainatory variables to limitate Multicollinearity problem among these variables and gain staibilty in their estimations more than those which yield from Ordinary Least Squares. But the cost that we pay in the other hand losing a little power of the estimation of the predictive regression function in explaining the essential variations. A suggested numerical formula has been proposed and applied by the researchers as optimal solution, and vererifing the its efficiency by a program written by the researchers themselves for this porpuse through some creterions: Cumulative Percentage Variance, Coefficient of Determination, Variance

... Show More
Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Cyber-security And Digital Forensics (ijcsdf)
Genetic Algorithm Approach for Risk Reduction of Information Security
...Show More Authors

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef

... Show More
Publication Date
Mon Oct 02 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach: An Article Review
...Show More Authors

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr

... Show More
View Publication
Publication Date
Mon Dec 28 2020
Journal Name
Journal Of The College Of Education For Women
Cognitive Implications of Usage-Based Approach: رغد فهمي اعجمي
...Show More Authors

Tremendous efforts have been exerted to understand first language acquisition to facilitate second language learning. The problem lies in the difficulty of mastering English language and adapting a theory that helps in overcoming the difficulties facing students. This study aims to apply Thomasello's theory of language mastery through usage. It assumes that adults can learn faster than children and can learn the language separately, and far from academic education. Tomasello (2003) studied the stages of language acquisition for children, and developed his theory accordingly. Some studies, such as: (Ghalebi and Sadighi, 2015, Arvidsson, 2019; Munoz, 2019; Verspoor and Hong, 2013) used this theory when examining language acquisition. Thus,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Solution of Variavle Delay integral eqiations using Variational approach
...Show More Authors

The main objective of this research is to use the methods of calculus ???????? solving integral equations Altbataah When McCann slowdown is a function of time as the integral equation used in this research is a kind of Volterra

View Publication Preview PDF