Colonialism radically transformed the cultures of colonized peoples, often rupturing Indigenous traditions and folklore. Whether creating colonial discourse, promoting orientalist literature, advocating western educational institutions, or through biased media representations, imperial powers systematically oppressed Indigenous and Native peoples. Subjugated communities, however, created, and still form postcolonial discourse from their knowledge systems. This discourse insists on Indigenous and Native culture as central to Indigenous and Native peoples identity. This study examines the postcolonial literature of three groups: Kānaka Maoli, African Americans, and Iraqis. The scope of this dissertation scrutinizes how folklore is employed as resistance in the postcolonial literature of Kānaka Maoli, African Americans, and Iraqis. Folklore as Resistance in Postcolonial Narratives and Cultural Practices: Hawaiian, African American, and Iraqi focuses on the centrality of folklore and cultural histories in the literature of these three groups. Kānaka Maoli emphasize the mo’olelo (hi/story) in their literature. Moʻolelo acts not only as a means to pass down hi/story and culturally significant stories from generation to generation (a genealogy) but also as a mode of resistance to hegemonic and imperial powers. Moʻolelo are not merely legends or myths; instead, they represent ancestral knowledge and connection to Kānaka history. Kānaka Maoli claim and revive ancestral moʻolelo in their literature and cultural performance to illuminate their relationship to place, ʻāina, and their country, the Hawaiian Kingdom. In this work, Dhiffaf al-Shwillay suggests that there are similar tendencies in the literature of Kānaka Maoli, African American, and Iraqis. The folklore and literature of these groups signify the histories of oppression and/or colonization and its aftermath. Al-Shwillay finds that Kānaka Maoli, African American, and Iraqi folklore in literature can be read as resistance to orientalism, oppression, and stereotyping. Following the trajectory of the historical and cultural context for the literary productions of these three communities, she offers analysis and reading of Sage Takehiro, Dana Naone Hall, Haunani-Kay Trask, Brandy Nālani McDougall, Zora Neale Hurston, Badr Shakir al-Sayyab, and Selim Matar. This dissertation concludes by emphasizing the dynamic political and cultural value of moʻolelo and folklore in postcolonial narratives. Al-Shwillay asserts that literature that draws upon folklore and cultural histories transmits evidence of oppressive powers and, crucially, resistance. In this mode of examination of postcolonial literature, al-Shwillay asserts that folklore records the resistance of peoples through their literary production. Folklore carries the knowledge of ancestors, cultural, and history.
Background: Helicobacter pylorus is one of the most harmful human pathogens & carcinogen. Of the world's population, more than 50% has H. pylori in their upper gastrointestinal tracts. It has been linked to a variety of extra gastric disorders. In correlation to hepatobiliary diseases; recently, the bacterium has been implicated as a risk factor for various diseases ranging from chronic cholecystitis and primary biliary sclerosing cholangitis to gall bladder cancer and primary hepatic carcinomas. However, the association between Helicobacter pylori (H. pylori) and gallbladder diseases is still vague and is controversial.
Aim of study: To elucidate the association of H pylori and gallbladder diseases (calculu
... Show MoreComplexes of Cr(III)andNi(II) ions with phthalate sulphanilate snthranillate hippurte and glycinate ions have been preparcd then the Nephelauxetic
The goal of this research is to introduce the concepts of Large-small submodule and Large-hollow module and some properties of them are considered, such that a proper submodule N of an R-module M is said to be Large-small submodule, if N + K = M where K be a submodule of M, then K is essential submodule of M ( K ≤e M ). An R-module M is called Large-hollow module if every proper submodule of M is Large-small submodule in M.
Abstract
The target derivative are gentamicin linked with L-Val- L-Ala by an ester linkage. These were synthesized by esterification method, which included the reaction of -OH hydroxyl group on (carbon No.5) of gentamicin with the acid chloride of the corresponding dipeptide, The preparation of new derivative of gentamicin involved protected the primary & secondary amine groups of Gentamicin, by Ethylchloroformate (ECF) to give N-carbomethoxy Gentamicin which was used for further chemical synthesis involving the free hydroxyl groups.
Then prepared dipeptide (L-Val- L-Ala) by conventional solution method in present DCC & HoBt then reacted with thionyl
... Show MoreHowever, the effects of these ideas are still evident
Think of those who follow the footsteps of Muslim scholars and thinkers.
Intellectual source of Gnostic Gnar
And in dealing with issues of Islamic thought
Annalisa intersecting trends of thought, Minya who melts in Masarya and supported him and believes in Bo and extremist Vue,
Lea, trying to throw it with a few times, looks at Elya look
There are those who stand in the opposite position
There are those who stand in a selective compromise, but this school of thought remains
G - the features of Islamic thought that believes in the mind and Imoto in the defense of
An intellectual station and generalized bar
Creed. In his study, the researcher wi
This Research based on an empirical study and tested the hypothesis of transition effects on a sample of young people in Sharjah University and trying to identify a new form of Media which is based on the production of new types of habits and patterns and their cultural impact. Recently, New Media appeared to refer to new types of Communication using the Internet. It’s enormous in the exchange of Information. The new Media contains multiple forms, including the form in which users produce by them to refer the entry of a new area of Media in which exchange of roles between the Sender and the recipient.
This study is trying to identify a new form of Media Web used (Press online or only Press online, Digi
... Show MoreUrban wetlands are one of the complex systems that provide many economic, social and environmental services to the city. In this research, the most important services provided by urban wetlands from the point of view of the urban planner were reviewed, and the types of these lands and their divisions according to the type of services provided by each type were presented. Environmental is represented in its ability to reduce the dangers of floods, mitigate the climate and reduce its negative impacts, purify water and deplete a lot of suspended impurities and pollutants, and social services such as recreational areas and beautiful landscapes that inspire joy and reassurance in the soul, as well as cultural areas and sports activities for m
... Show MoreThe occurrences of invasive candidiasis has increased over the previous few decades. Although Candida albicans considers as one of the most common species of organisms, that cause acquired fungal infections. Candida albicans is an opportunistic fungal pathogen and inherent in as a lifelong, the yeast is present in healthy individuals as a commensal, and can reside harmlessly in human body. However, in immuno-compromised individuals, the fungus can invade tissues, producing superficial infections and, in severe cases, life-threatening systemic infections. This review wills emphasis on virulence factor of C. albicans including (adhesion, invasion, candida proteinase, and phenotypic switching and biofilm formation. I
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreA research include of synthesized five member ring, which has been synthesized by condensation of 2-(1-(4- hydroxyphenyl) ethylidene)hydrazine-1-carbothioamide[I] with α-chloro ethylacetate in sodium acetate (fused) to form ethyl 2-(4-(1-((4-oxo-2-thioxopyrrolidin-3-ylidene)hydrazono) ethyl)phenoxy)acetate [II]. After that reacted [II]with hydrazine hydrate to resulting compound [III]. Compound [III] was refluxed with 4-aminobenzoicacid in excess of phosphorus oxy chloride give compound [IV],the later compound [IV] interact with acetyl acetone or ethylacetoacetate give to pyrazole and pyrazoline derivatives[V],[VI]. While when reacted with different aromatic aldehydes and one ketone consistence Schiff base derivatives [VII]a-e . The FTIR a
... Show More