Colonialism radically transformed the cultures of colonized peoples, often rupturing Indigenous traditions and folklore. Whether creating colonial discourse, promoting orientalist literature, advocating western educational institutions, or through biased media representations, imperial powers systematically oppressed Indigenous and Native peoples. Subjugated communities, however, created, and still form postcolonial discourse from their knowledge systems. This discourse insists on Indigenous and Native culture as central to Indigenous and Native peoples identity. This study examines the postcolonial literature of three groups: Kānaka Maoli, African Americans, and Iraqis. The scope of this dissertation scrutinizes how folklore is employed as resistance in the postcolonial literature of Kānaka Maoli, African Americans, and Iraqis. Folklore as Resistance in Postcolonial Narratives and Cultural Practices: Hawaiian, African American, and Iraqi focuses on the centrality of folklore and cultural histories in the literature of these three groups. Kānaka Maoli emphasize the mo’olelo (hi/story) in their literature. Moʻolelo acts not only as a means to pass down hi/story and culturally significant stories from generation to generation (a genealogy) but also as a mode of resistance to hegemonic and imperial powers. Moʻolelo are not merely legends or myths; instead, they represent ancestral knowledge and connection to Kānaka history. Kānaka Maoli claim and revive ancestral moʻolelo in their literature and cultural performance to illuminate their relationship to place, ʻāina, and their country, the Hawaiian Kingdom. In this work, Dhiffaf al-Shwillay suggests that there are similar tendencies in the literature of Kānaka Maoli, African American, and Iraqis. The folklore and literature of these groups signify the histories of oppression and/or colonization and its aftermath. Al-Shwillay finds that Kānaka Maoli, African American, and Iraqi folklore in literature can be read as resistance to orientalism, oppression, and stereotyping. Following the trajectory of the historical and cultural context for the literary productions of these three communities, she offers analysis and reading of Sage Takehiro, Dana Naone Hall, Haunani-Kay Trask, Brandy Nālani McDougall, Zora Neale Hurston, Badr Shakir al-Sayyab, and Selim Matar. This dissertation concludes by emphasizing the dynamic political and cultural value of moʻolelo and folklore in postcolonial narratives. Al-Shwillay asserts that literature that draws upon folklore and cultural histories transmits evidence of oppressive powers and, crucially, resistance. In this mode of examination of postcolonial literature, al-Shwillay asserts that folklore records the resistance of peoples through their literary production. Folklore carries the knowledge of ancestors, cultural, and history.
Altruism is one of good qualities of human being expressing his highness and triumph. Self control has A signifies in a lot of psychological, educational, Social, ethical and healing fields Where the higher self control relates with high degrees of carefulness accuracy, problem solving, choice. judgment and decision making. the present study aimos at measuring altruism among university students , self control among them , recognizing the statistically differences significance on self control among university students according to gender variable and recognizing the correlation between attruism and self control among university students . the sample consists of the basic application one (200) students (100) males and (100) males that had
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreSpot panchromatic satellite image had been employed to study and know the difference Between ground and satellite data( DN ,its values varies from 0-255) where it is necessary to convert these DN values to absolute radiance values through special equations ,later it converted to spectral reflectance values .In this study a monitoring of the environmental effect resulted from throwing the sewage drainages pollutants (industrial and home) into the Tigris river water in Mosul, was achieved, which have an effect mostly on physical characters specially color and turbidity which lead to the variation in Spectral Reflectance of the river water ,and it could be detected by using many remote sensing techniques. The contaminated areas within th
... Show MoreThe objective of this study was to investigate the levels of depression, anxiety, and stress among dentists during covid-19 lockdown and to investigate the relationship between stress and each mental health state.
A cross-sectional survey on 269 dentists was conducted using DASS-21 and PHQ-9 questionnaires. Bivariate and multivariate models were constructed and the odds ratio (OR) was calculated to assess the strength of the association between an independent categorical variable and the outcome.
Being unsatisfied with the job was as
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreBackground: The presence of cancer has a profound psychological impact on the quality of life of patients and their families, on family and social relationships, and on role functioning.
Aim of the study: Assess the impact of childhood cancer on patients and their families.
Subjects and methods: A Prospective questionnaire-based study, for 151 patients, had malignancy identified by tumor registry of Children Welfare Teaching Hospital. The information was taken from the parent(s) in the presence of the patient who sometimes answered some questions during the interview.
Result: There was an interview with 151 families of children with cancer in t
... Show MoreEntropy generation was studied for new type of heat exchanger (shell and double concentric tubes heat exchanger). Parameters of hot oil flow rate, temperature of inlet hot oil and pressure drop were investigated with the concept of entropy generation. The results showed that the value of entropy generation increased with increasing the flow rate of hot oil and when cold water flow rate was doubled from 20 to 40 l/min, these values were larger. On the other hand, entropy generation increased with increasing the hot oil inlet temperature at a certain flow rate of hot oil. Furthermore, at a certain hot oil inlet temperature, the entropy generation increased with the pressure drop at different hot oil inlet flow rates. Final
... Show More