Preferred Language
Articles
/
IhdMU44BVTCNdQwCG0IF
Property and Possession in Gayl Jones’s Novel Corregidora: A Study in African American Literature and Literary Theory
...Show More Authors

the traumatic memory of their ancestors. The novel navigates sites of trauma, memory, and blues music while resisting the bourgeoisie-capitalist relationships that permeated not only white society but also African American communities. Jones’s novel presents the plight of an African American woman, Ursa, caught between the memory of her enslaved foremothers and her life in an emancipated world. The physical and spiritual exploitation of African American women who bear witness to the history of slavery in Corregidora materializes black women’s individuality. This article is framed by trauma studies as well as the Marxists’ concepts of commodification, accumulation, and production. Ursa, one of the Corregidora women, represents a commodified individual in her own community. However, in Ursa, Jones writes a blacks woman’s voice that undermines, interrupts, and destabilizes the patriarchal dynamic of America. Corregidora is a novel that forms from a black women’s perspective that refuses the enslavement of African American women’s bodies, hi/stories, and voices (both during and post-slavery). 

Crossref
View Publication
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Thu Aug 11 2022
Journal Name
Arabian Journal For Science And Engineering
Synthesis and Characterization of Novel Nano Azo Compounds as a New pH Sensor
...Show More Authors

View Publication
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (31)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
SBOA: A Novel Heuristic Optimization Algorithm
...Show More Authors

A new human-based heuristic optimization method, named the Snooker-Based Optimization Algorithm (SBOA), is introduced in this study. The inspiration for this method is drawn from the traits of sales elites—those qualities every salesperson aspires to possess. Typically, salespersons strive to enhance their skills through autonomous learning or by seeking guidance from others. Furthermore, they engage in regular communication with customers to gain approval for their products or services. Building upon this concept, SBOA aims to find the optimal solution within a given search space, traversing all positions to obtain all possible values. To assesses the feasibility and effectiveness of SBOA in comparison to other algorithms, we conducte

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (9)
Scopus Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
A novel cryptosystem using integer power
...Show More Authors

Various methods are utilized providing complexity for cryptosystem with the aim to increase the security and avoiding hacker attack. Hybrid cryptosystem is one of these cryptosystems which is used two types of cryptosystems and has many applications in data transmitted. This research, proposed a novel method that used power exponent instead of using the prime number directly and also providing complexity of asymmetric cryptosystems. This method has been applied theoretically in two public systems RSA and EL-Gamal. Power RSA and Power EL-Gamal are modified asymmetric cryptosystems, in which the power number is kept by the sender and the receiver. Moreover, we use group theory to prove that these cryptosystems work properly. Our exten

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Jun 30 2013
Journal Name
International Journal For Sciences And Technology
Synthesis and anti-bacterial study of novel compounds with bis (four-, five-, and seven-membered) heterocyclic rings
...Show More Authors

New twin compounds having four-, five-, and seven- membered heterocyclic rings were synthesized via Schiff bases (1a,b) which were obtained by the condensation of o-tolidine with two moles of 4- N,N-dimethyl benzaldehyde or 4- chloro benzaldehyde. The reaction of these Schiff bases with two moles of phenyl isothiocyanate, phenyl isocyanate or naphthyl isocyanate as in scheme(1) led to the formation of bis -1,3- diazetidin- 2- thion and bis -1,3- diazetidin -2-one derivatives (2-4 a,b). While in scheme (2) bis imidazolidin-4-one (5a,b) ,bistetrazole (6a,b) and bis thiazolidin-4-one (7a,b) derivatives were produced by reacting the mentioned Schiff bases(1a,b)with two moles of glycine, sodium azide or thioglycolic acid, respectively. The new b

... Show More
Publication Date
Mon Jan 30 2023
Journal Name
Iraqi Journal Of Science
Study the Effect of Oxygen on Coronene Electronic and Spectroscopic Properties via the Density Functional Theory (DFT)
...Show More Authors

    The electronic properties (such as energy gap HOMO levels. LUMO levels, density of state and density of bonds in addition to spectroscopic properties like IR spectra, Raman spectra, force constant and reduced masses as a function of frequency) of coronene C24 and reduced graphene oxide C24OX , where x=1-5, were studied.. The  methodology employed was  Density Functional Theory (DFT) with Hybrid function B3LYP and 6-311G** basis sets. The energy gap was calculated for C24 to be 3.5 eV and for C24Ox was from 0.89 to 1.6862 eV  for x=1-5 ,respectively.   These energy gaps values are comparable to the measured gap of Graphene (1-2.2 eV). The spectroscopic properties were  compared with experimental measurements, specificall

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sun Mar 01 2020
Journal Name
مجلة البحوث والدراسات الإسلامية
Religious and Psychological guidance in the Qur’an and Sunnah, a descriptive study
...Show More Authors

God saw his servants with truth and light, and made him easy for them, and he commanded those who help them, including a counselor, guide and preacher, so if a Muslim sees deficiencies or defects, he must help him to reform and refine it. That it was in the hands of the prophets, God Almighty created the human being together straight, then melted on those scholars and researchers in all religions on psychological counseling and religious sychotherapy, stressing the importance of religious values in the process of understanding man in the process of psychotherapy and in controlling human behavior. A lot of research and studies have been published. I dealt with the religious approach in the process of treating mental disorders and the aim of

... Show More
Publication Date
Thu Jun 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Synthesis of Novel Porphyrin Derivatives and Investigate their Application in Sensitized Solar Cells
...Show More Authors

Solar energy has significant advantages compared to conventional sources such as coal and natural gas, including no emissions, no need for fuel, and the potential for installation in a wide range of locations with access to sunlight. In this investigation, heterocyclic derivatives were synthesized from several porphyrin derivatives (4,4',4",4"'-(porphyrin-5,10,15,20-tetrayl) tetra benzoic acid) compound (3), obtained by reaction Pyrrole with 4-formyl benzoic acid. Subsequently, porphyrin derivative-component amides 5a, 5b, and 5c were produced by reacting compound (3) with amine derivatives at a 1:4 molar ratio. These derivatives exhibited varying sensitivities for utilization in solar cells, with compound 5a displaying the highest power

... Show More
View Publication Preview PDF
Crossref