تحلل الورقة الحالية تمثيل كاريل تشرشل للصورة النمطية للمرأة في Top Girls (1982). تُظهر المسرحية كيف وصلت النساء في نضالهن لمحاربة اضطهاد الرجال عبر التاريخ ، إلى مستوى من القوة والحرية يستخدمان للسيطرة على جنسهن دون شفقة. مارلين ، الشخصية المركزية في هذه المسرحية ، هي امرأة تبنت الصفات الذكورية إلى أقصى الحدود. لتسلق سلم النجاح إلى قمته ، تضحي مارلين بطفلها وعائلتها وحبها. كما تعرض المسرحية النساء الصامتات والمضطهدات والمعتمدات وضحى بفرصة الاستقلال والحرية. علاوة على ذلك ، تبحث الورقة في وجهات نظر الطبقات المختلفة ، وخاصة وضع الطبقة العاملة ، تجاه سياسات أول رئيسة وزراء في المملكة المتحدة ، السيدة الحديدية ، مارغريت تاتشر.
ervical cancer is one of the most frequently diag nosed malignancies representing the fourth leading cause of cancer-related death in females’ worldwide, with approximately 500,000 new cases diagnosed and 280,000 deaths occurring each year. Mxi1, an antagonist of c-Myc, maps to human chromosome 10q24-q25, a region altered in a substantial fraction of prostate tumors, in prostate cancer, where a high frequency of loss and mutation of the MXI1 gene has been reported. The aim of present study was to find out the possible association of exon deletion of MXI1 gene with incidence of cervical abnormalities and cancers in some Iraqi married women. The present study include collection of 120 scraping cervical cells samples from women clinically di
... Show MoreThis paper highlights the main features of conjunctive adverbials and their occurrence in English academic prose. It accounts for the semantic roles of conjunctive adverbials, forms in which they are used, their positions within a sentence, and their frequency of occurrence in different registers with special reference to academic prose. It also tries to investigate possible differences in men's and women's use of conjunctive adverbials.
Keyword: conjunctive adverbials, linking adverbials, stance adverbials, circumstance adverbials, academic prose
The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreIn this paper, an efficient image segmentation scheme is proposed of boundary based & geometric region features as an alternative way of utilizing statistical base only. The test results vary according to partitioning control parameters values and image details or characteristics, with preserving the segmented image edges.
n this study, data or X-ray images Fixable Image Transport System (FITS) of objects were analyzed, where energy was collected from the body by several sensors; each sensor receives energy within a specific range, and when energy was collected from all sensors, the image was formed carrying information about that body. The images can be transferred and stored easily. The images were analyzed using the DS9 program to obtain a spectrum for each object,an energy corresponding to the photons collected per second. This study analyzed images for two types of objects (globular and open clusters). The results showed that the five open star clusters contain roughly t
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le
... Show More