Preferred Language
Articles
/
DRfJio4BVTCNdQwCuFQR
Staging Violence in Sarah Kane’s Blasted & Ali Abdulnebi al Ziadi’s Fourth Generation: a Comparative Study
...Show More Authors

Violence occurs as a daily human action all over the world; it may cause so many kinds of damage to individuals as well as to society: physical, psychological, or both. Many literary authors of different genres have tried their best to portray violence by showing its negative effects, especially playwrights because they have the chance to show people the dangers of violence through performance on stage to warn them against such negatively affected action. It has been a human action since the beginning of human life on this planet when the first crime happened on earth when Cane killed his brother Abel. In our modern world, people are witnessing daily violent actions as a result of destructive wars that turned the humans into brutal beings. This paper deals with violence as it occurred as a result of the atrocities of wars in two different societies during the same period of the 1990s: A European country (probably Bosnia or Britain), as reflected in Sarah Kane’s Blasted (1995), and Iraqi, as shown by Ali Abdulnebi Al Zaidi’s Fourth Generation (1997). Although violence takes different shapes, still it has the same destructive effects on the life of people who are involved in. The researcher tries to show how both writers have staged violence during the performances of their plays.

Crossref
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Mechanical Engineering Research And Developments
Development of natural convection heat transfer in heat sink using a new fin design
...Show More Authors

Scopus (2)
Scopus
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Sun Mar 25 2018
Journal Name
Biomedical And Pharmacology Journal
Anti CD20 Monoclonal Antibody (Rituximab) as a Rescue Treatment in Severe and Refractory SLE
...Show More Authors

Systemic lupus erythematosus (SLE) is an autoimmune disease with polymorphic expression. B cells have an essential contribution in immune system activation via the production of different cytokines and functioning as potent antigen-presenting cells. Therefore, a drug that particularly targets B cells may represent an ideal therapeutic approach for SLE. Rituximab (RTX), an anti-CD20 monoclonal antibody causing transient B-cell depletion, has been used to manage SLE. This study aims to assess Rituximab effects on lupus nephritis (LN) patients when added to conventional immunosuppressants. Twenty four patients, 15-32 years old, with class III/IV/V LN were involved in this study. All were on steroids before lupus nephritis occurrence. They were

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Fri Apr 29 2022
Journal Name
Sar Journal Of Surgery
Variation of Sphenoid Sinus Pneumatization on CT scan in A Sample of Iraqi Patients
...Show More Authors

Background: Computerized tomography scan can show the detailed anatomy of the nose and paranasal sinuses. The sphenoid sinus is a very important corridor for the skull base because of its central position. This sinus has a great range of variation and can put structures around at risk during surgery. This study aims to examine the variation of the sphenoid sinus, and its relation to other structures around it, in this sample of Iraqi patients. Materials and Methods: CT scans of 122 patients, were obtained, and submitted for examination and measurements, during the period between September 2020 and September 2021. Observation of The sphenoid sinus pneumatization pattern, clival extension, Onodi cell, and lateral pneumatization of SS.

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sat Jun 30 2018
Journal Name
College Of Islamic Sciences
Narrative narration in the poetry of Mohammed Abdul Muttalib   (Top poem as a model)
...Show More Authors

Poets of the age since ancient times to recount the events of their adventures in a fun story style in which the elements of the story of personalities, time and place, and we do not mean this modern art technique (poetic story) as it is now, but was aimed at the pleasures of the other receiving because it is the rule of the quality of literary output, Other times the narrative of events inspired by his broad imagination and this mixing indicates the story's involvement with Arabic poetry to be (poetic story) and this depends entirely on addressing the poet to the recipient, and requires in this narrative to be familiar with the elements of influence and suspense in the other or turned into a monotonous and dull narrative Influential, un

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 29 2022
Journal Name
Journal Of The College Of Education For Women
A Dystopian Future: Social Oppression and Religious Extremism in Margaret Atwood's The Handmaid's Tale
...Show More Authors

Many literary research papers have dealt with the work of Margaret Atwood's The Handmaid's Tale (1985) as a feminist work. However, nearly few studies combine social oppression with religious extremism. To bridge this gap, the present study aims at exploring the use of totalitarian theocracy of terror to oppress its citizens in the name of religion. In other words, it explicates the way religion is used to brutally suppress and exploit people in general and vulnerable women in particular. To meet this objective, the study adopted the qualitative descriptive method to describe how religion is used as a contradictory controlling means in Gilead discourse. It also adopted the Foucault theory in analyzing the data of the study, illu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Open Veterinary Journal
Anatomical differences in the biliary duct system between canines and felines: A review article
...Show More Authors

The liver is one of the largest glands in the digestive system and performs 13 various functions, including the secretion of hormones and enzymes. The gallbladder serves as a storage reservoir for secretions before they are released into the digestive system through the duodenum. The bile ducts branch from the liver’s lobes and ultimately connect to the digestive system, making this structure significant and distinct among different animal species. This review focuses on the differences between dogs and cats, highlighting the importance of these differences from both health and pathological perspectives. After conducting a detailed scientific review of the biliary tree in dogs and cats, we concluded that cats are more susceptible

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 18 2022
Journal Name
Journal Of Interdisciplinary Mathematics
The dynamics of Coronavirus pandemic disease model in the existence of a curfew strategy
...Show More Authors

View Publication
Scopus (13)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Wed Jun 07 2023
Journal Name
Journal Of Educational And Psychological Researches
Building a Training Program in the development of the Willpower of the Kindergarten Children
...Show More Authors

The research aims to build a training program to develop the willpower in the kindergarten children. In order to achieve the objective of the research, the two researchers have developed a Training Program according to the following steps:

- Determining the general objective of the Training Program.

- Determining the behavioral objectives of the Training Program.

- Determining the content of the Training Program.

- Implementing the content of the Training Program sessions.

- Evaluating the Training Program.

The training program consisted of (15) sessions, each session included a set of parts (title, general objective, methods, time and place to implement the sessions, behavioral goals, tool

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 09 2021
Journal Name
Romanian Neurosurgery
Primary multiple cerebral hydatid disease in a young patient with surgically-treated intracerebral haemorrhage
...Show More Authors

Introduction:  Cerebral hydatid disease (CHD) is rare and the multiple-cystic variety is even rarer. In this paper, we report a case of multiple CHD and explore a possible link with a preceding spontaneous intracerebral haemorrhage (ICH).   Case presentation: A 27-year old gentleman with a history of surgically-evacuated, spontaneous ICH presented with severe headache, left-sided weakness - Medical Research Council (MRC) grade II - and recurrent tonic-clonic seizures, while on a full dose of anti-epileptic medication. Brain magnetic resonance imaging (MRI) scans showed multiple intra-axial cystic lesions in the right hemisphere. The cysts were removed intact using Dowling’s technique through a large temporoparietal crani

... Show More
View Publication Preview PDF
Crossref (2)
Crossref