This article focuses on identity construction and social structures within the Sāmoan community as represented in Sia Figiel’s novel Where We Once Belonged. I argue that however the post/colonial Sāmoan identity is hybridized, the essence of the individual is still connected to Fa’a Sāmoa-the Sāmoan traditions and ways. However rapid are the colonial vicissitudes, the Sāmoan literature and lifestyle are developed to be a resistance platform. This resistance platform is dedicated not only to expose the colonial impact but also to assist the social and political reconstruction of post/colonial Samoa. To this end, this article studies identity construction, and the challenges that women face within Sāmoan social structures.
Improving the environment is a mission that should be conducted by three associates; public authorities, environmentalists and the community. The ignorance of environmental education in Iraq has resulted to an almost environmentally illiterate community, demanding well planned programs to raise their environmental; awareness and education. On the other hand, the decision makers should be well informed about the citizens' environmental preferences to be able to set their priorities for the civil services. Merging the Iraqi citizens in listing their environmental priorities is one of many other approaches for "Environment Education" programs. Globally, such methods have proven to be effective and resulted to widespread understandin
... Show MoreWith the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show MoreThe current article focuses on studying the social organization reality of the Iraqi society; it aims to construct an Iraqi organized personality that believe in the principles of Islamic religion by making use of the sociology thoughts in explaining the strength of social organization, and the causes of social deviance in attempt of decreasing the deviance and strengthening the cohesion of Iraqi character.
The researchers put forward some questions: to what extent the western theoretical pattern can succeed in explaining the social organization of the Iraqi society? What is the more appropriate western theory for diagnosing the cohesion and deviance of the society? What is the s
... Show MoreBackground: Preoperative radiographical assessment of the maxillofacial lesions is of a great importance in guiding the surgeon during surgical procedure in reducing post-operative complications. This study highlighted the application of CBCT scan in the assessment of maxillofacial cystic and cystic like lesions as a part of advanced radiology Materials and methods: A total of 20 patients (15 males and 5 females) participated in this prospective study. CBCT scan (Kodak 9500 CBCT) with (DICOM) software utilized to perform scanning to all patients in order to assess lesion extension, morphological features and it’s relation to the adjacent vital structures. Results: In this study, the total cystic and cystic like lesions involving the
... Show MoreThe diesel oil type S-3 specified for diesel engine has limited the suitability for diesel trucks for 8000 km, but didn't clarify its suitability if used in tractor engines.It is known that the work style of farm tractor differs from that of other vehicles where tractors are used for all the activities in sever conditions and under the complete usage of the available power and capability, so there is no sign or indication of the usage period of this oil in tractor's engine. The oil has been used on Cirta C6806 tractors. The manual book of the tractor's engine, Deutz recommends changing the oil every 100 hrs. Therefore the main goal of this research is to give the recommended working hours for S-3 diesel oil when used in farm tractor engines
... Show MoreAPDBN Rashid, Southern African Linguistics and Applied Language Studies, 2023
Glutathione S-transferases (GSTs) are enzymes that included, in a more range of detoxifying reactions by conjugation of glutathione, to electrophilic material. Polymorphisms n the genes that responsible of GSTs affect, the function of the GSTs. GSTs play an active role in protection of cell against oxidative stress mechanism. Polymorphisms of GSTP1 at codon 105 amino acids forms GSTP1 important site for bind of hydrophobic electrophiles and the substitution of Ile/Val affect substrate specially catalytic activity of the enzyme and may correlate with reach to different diseases in human like diabetes mellitus type2 disease. Correlation between these polymorphisms and changes in the parameters file of diabetic patients has also bee
... Show More