Preferred Language
Articles
/
KxdZU44BVTCNdQwCEEJ1
Identity Construction and Social Structures in Sia Figiel’s Novel Where We Once Belonged
...Show More Authors

This article focuses on identity construction and social structures within the Sāmoan community as represented in Sia Figiel’s novel Where We Once Belonged. I argue that however the post/colonial Sāmoan identity is hybridized, the essence of the individual is still connected to Fa’a Sāmoa-the Sāmoan traditions and ways. However rapid are the colonial vicissitudes, the Sāmoan literature and lifestyle are developed to be a resistance platform. This resistance platform is dedicated not only to expose the colonial impact but also to assist the social and political reconstruction of post/colonial Samoa. To this end, this article studies identity construction, and the challenges that women face within Sāmoan social structures.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Thu Mar 19 2015
Journal Name
Al-academy
The Significance of the Folk Symbols and Their Influence on The National Identity (Chosen samples from the Contemporary Iraqi Pottery): زينب كاظم صالح
...Show More Authors

The contemporary art culture is considered a resultant of preceding human civilizations from the early days. At the same time, it got closer to the local privacy, because the contemporary Iraqi potter worked hard to create new art, refusing to base his art on the early works, creating art pieces that contains properties to inherited art and their form significance, in order to create a new identity of his own, bringing an empowerment to his deepened civilization, with the goal to create national identity ideas from one hand, and entity and locality from another. Europeans also followed the direction of our civilization, such as (Picasso, Henry Moore, Barbra Hurth, Brankouzi, Hans Arp,..etc). From this point of view comes the importance o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 26 2019
Journal Name
International Journal Of Pharmaceutical Research
Synthesis and identification of novel 2-thioxoimidazolidin- 4-one derivatives containing azo and ester groups
...Show More Authors

The compounds 3-[4̄-(4˭-methoxybenzoyloxy) benzylideneamino]-2-thioxo-imidazolidine-4-one(3)aand 4-(1-(5-oxo- 2-thioxoimidazolidin-1-ylimino)ethyl)phenyl acetate(3)b were prepared from the reaction of aromatic aldehyde or ketone(1)a,bwith thiosemicarbazide to give aryl thiosemicarbazones(2)a,b ,followed by cyclization with ethylchloroacetate in the presence of fused sodium acetate. Treatment the compounds(3)a,bwith 4- hydroxybenzenediazoniumchloride yielded the correspondings4-((4-((4-hydroxyphenyl)diazenyl)-5-oxo-2- thioxoimidazolidin-1-ylimino)methyl)phenyl 4-methoxybenzoate(4)aand4-(1-(4-((4-hydroxyphenyl)diazenyl)-5-oxo-2- thioxoimidazolidin-1-ylimino)ethyl)phenyl acetate(4)b.The new 2-thioxo-imidazolidin-4-one with esters (5-7)a,b sy

... Show More
Publication Date
Mon Jan 01 2024
Journal Name
Current Chemistry Letters
Synthesis and characterisation of novel metal-organic frameworks (MOFs) based on zirconium and bicinchoninic acid
...Show More Authors

Metal-organic frameworks (MOFs) are a relatively new class of materials of unique porous structures and exceptional properties. Currently, more than 110,000 types of MOFs have been reported among the countless possibilities. In this study, we have synthesised a novel MOF using zirconium chloride as the metal source and 4,4'-dicarboxy-2,2'-biquinoline (bicinchoninic acid disodium salt) as the linker, which reacted in N,N-Dimethylformamide (DMF) solvent. Three preparation methods were employed to prepare five types of the MOF, and they were compared to optimize the synthesis conditions. The resulting MOFs, named Zr-BADS, were characterised using scanning electron microscopy (SEM), energy dispersive spectroscopy (EDS), microscopy, and

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Wed Mar 18 2009
Journal Name
Molecular Crystals And Liquid Crystals
Synthesis and Mesomorphic Behavior of Some Novel Compounds Containing 1,3,4-Thiadiazole and 1,2,4-Triazole Rings
...Show More Authors

View Publication
Scopus (28)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Thu Sep 26 2019
Journal Name
Journal Of Pharmaceutical Research International
Synthesis and identification of novel 2-thioxoimidazolidin-4-one derivatives containing azo and ester groups
...Show More Authors

The compounds 3-[4̄-(4˭-methoxybenzoyloxy) benzylideneamino]-2-thioxo-imidazolidine-4-one(3)aand 4-(1-(5-oxo- 2-thioxoimidazolidin-1-ylimino)ethyl)phenyl acetate(3)b were prepared from the reaction of aromatic aldehyde or ketone(1)a,bwith thiosemicarbazide to give aryl thiosemicarbazones(2)a,b ,followed by cyclization with ethylchloroacetate in the presence of fused sodium acetate. Treatment the compounds(3)a,bwith 4- hydroxybenzenediazoniumchloride yielded the correspondings4-((4-((4-hydroxyphenyl)diazenyl)-5-oxo-2- thioxoimidazolidin-1-ylimino)methyl)phenyl 4-methoxybenzoate(4)aand4-(1-(4-((4-hydroxyphenyl)diazenyl)-5-oxo-2- thioxoimidazolidin-1-ylimino)ethyl)phenyl acetate(4)b.The new 2-thioxo-imidazolidin-4-one with esters (5-7)a,b sy

... Show More
Preview PDF
Publication Date
Tue Oct 05 2010
Journal Name
Journal Of College Of Education For Women
Conversation Analysis of Forum: a Selected Text from Paul S. Kemp Online Journal
...Show More Authors

Language as a means of communication has long been the concern of many conversation analysts in their studies such as: Sacks et al. (1974), Schegloff et al. (1977), Duncan (1972), Grice (1975) and Burton (1980). Burton has attempted analyzing the first ten transitions of the play “The Dumb Waiter” for mere a presentation of her approach. This paper aims at analyzing the conversational structure of forum on the subject of literary fiction and genre fiction by applying Burton’s model (1980) of analysis to answer the question to what extent this model is applicable in analyzing the presented text. The findings of the investigation have proved the applicability of the structure of conversation formulated by Burton (1980) in her model wit

... Show More
Preview PDF
Publication Date
Sun Dec 15 2019
Journal Name
Al-academy
Comic Scene Construction between Dramatic Situation and Acting Performance in Feature Film: علاء الدين عبد المجيد جاسم-عمار حميد حسين
...Show More Authors

The research (Comic Scene Construction between Dramatic Situation and Acting Performance in Feature Film) has been divided into the following: the methodological framework which consists of the problem of the research: how to construct the comic scene between the dramatic situation and acting performance in the feature film. The research importance and aims are: identifying how to construct the comic scene between the dramatic situation and acting performance in the feature film. The limits of the research are also stated.
The research is divided into three sections: the first is the comic situation and the Aristotelian discourse in which the comic situation is clarified starting from the Aristotelian discourse. The second section: me

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Journal Of Engineering
Use Risk Score Method to Identify the Qualitative Risk Analysis Criteria in Tendering Phase in Construction Projects
...Show More Authors

The purpose of this article was to identify and assess the importance of risk factors in the tendering phase of construction projects. The construction project cannot succeed without the identification and categorization of these risk elements. In this article, a questionnaire for likelihood and impact was designed and distributed to a panel of specialists to analyze risk factors. The risk matrix was also used to research, explore, and identify the risks that influence the tendering phase of construction projects. The probability and impact values assigned to risk are used to calculate the risk's score. A risk matrix is created by combining probability and impact criteria. To determine the main risk elements for the tender phase of

... Show More
Preview PDF
Crossref (2)
Crossref