the traumatic memory of their ancestors. The novel navigates sites of trauma, memory, and blues music while resisting the bourgeoisie-capitalist relationships that permeated not only white society but also African American communities. Jones’s novel presents the plight of an African American woman, Ursa, caught between the memory of her enslaved foremothers and her life in an emancipated world. The physical and spiritual exploitation of African American women who bear witness to the history of slavery in Corregidora materializes black women’s individuality. This article is framed by trauma studies as well as the Marxists’ concepts of commodification, accumulation, and production. Ursa, one of the Corregidora women, represents a commodified individual in her own community. However, in Ursa, Jones writes a blacks woman’s voice that undermines, interrupts, and destabilizes the patriarchal dynamic of America. Corregidora is a novel that forms from a black women’s perspective that refuses the enslavement of African American women’s bodies, hi/stories, and voices (both during and post-slavery).
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreA new human-based heuristic optimization method, named the Snooker-Based Optimization Algorithm (SBOA), is introduced in this study. The inspiration for this method is drawn from the traits of sales elites—those qualities every salesperson aspires to possess. Typically, salespersons strive to enhance their skills through autonomous learning or by seeking guidance from others. Furthermore, they engage in regular communication with customers to gain approval for their products or services. Building upon this concept, SBOA aims to find the optimal solution within a given search space, traversing all positions to obtain all possible values. To assesses the feasibility and effectiveness of SBOA in comparison to other algorithms, we conducte
... Show MoreThe current study aimed to determine the morphometric and meristic characteristics of the North African catfish Clarias gariepinus (Burchell, 1822). Six specimens of C. gariepinus were collected from the Tigris River, in central Iraq. This study is considered the confirmation first record of this species in Iraq, and the second documentation of this exotic fish. The present species is characterized by a very long dorsal fin, a rounded caudal fin and four pairs of barbels.
The current study aimed to determine the morphometric and meristic characteristics of the North African catfish Clarias gariepinus (Burchell, 1822). Six specimens of C. gariepinus were collected from the Tigris River, in central Iraq. This study is considered the confirmation first record of this species in Iraq, and the second documentation of this exotic fish. The present species is characterized by a very long dorsal fin, a rounded caudal fin and four pairs of barbels.
The current study aimed to determine the morphometric and meristic characteristics of the North African catfish Clarias gariepinus (Burchell, 1822). Six specimens of C. gariepinus were collected from the Tigris River, in central Iraq. This study is considered the confirmation first record of this species in Iraq, and the second documentation of this exotic fish. The present species is characterized by a very long dorsal fin, a rounded caudal fin and four pairs of barbels.
The electronic properties (such as energy gap HOMO levels. LUMO levels, density of state and density of bonds in addition to spectroscopic properties like IR spectra, Raman spectra, force constant and reduced masses as a function of frequency) of coronene C24 and reduced graphene oxide C24OX , where x=1-5, were studied.. The methodology employed was Density Functional Theory (DFT) with Hybrid function B3LYP and 6-311G** basis sets. The energy gap was calculated for C24 to be 3.5 eV and for C24Ox was from 0.89 to 1.6862 eV for x=1-5 ,respectively. These energy gaps values are comparable to the measured gap of Graphene (1-2.2 eV). The spectroscopic properties were compared with experimental measurements, specificall
... Show MoreNew twin compounds having four-, five-, and seven- membered heterocyclic rings were synthesized via Schiff bases (1a,b) which were obtained by the condensation of o-tolidine with two moles of 4- N,N-dimethyl benzaldehyde or 4- chloro benzaldehyde. The reaction of these Schiff bases with two moles of phenyl isothiocyanate, phenyl isocyanate or naphthyl isocyanate as in scheme(1) led to the formation of bis -1,3- diazetidin- 2- thion and bis -1,3- diazetidin -2-one derivatives (2-4 a,b). While in scheme (2) bis imidazolidin-4-one (5a,b) ,bistetrazole (6a,b) and bis thiazolidin-4-one (7a,b) derivatives were produced by reacting the mentioned Schiff bases(1a,b)with two moles of glycine, sodium azide or thioglycolic acid, respectively. The new b
... Show MoreSolar energy has significant advantages compared to conventional sources such as coal and natural gas, including no emissions, no need for fuel, and the potential for installation in a wide range of locations with access to sunlight. In this investigation, heterocyclic derivatives were synthesized from several porphyrin derivatives (4,4',4",4"'-(porphyrin-5,10,15,20-tetrayl) tetra benzoic acid) compound (3), obtained by reaction Pyrrole with 4-formyl benzoic acid. Subsequently, porphyrin derivative-component amides 5a, 5b, and 5c were produced by reacting compound (3) with amine derivatives at a 1:4 molar ratio. These derivatives exhibited varying sensitivities for utilization in solar cells, with compound 5a displaying the highest power
... Show More