The struggle between two identities is a crucial subject everywhere. Some people travel abroad in quest of a new identity after struggling at home. People migrate and embrace a new identity for different reasons. They find themselves in a state of internal conflict as they navigate the tension between their newly adopted identities and their old ones. The individual is haunted and overwhelmed by their previous experiences. This research explores the universality of the subject matter by examining the motivations underlying the adoption of a new identity in a distinct geographical and temporal context. This paper examines the literary works of Kincaid's Lucy (1990) and Blasim's "The Nightmares of Carlos Fuentes" (2014). Kincaid’s protagonist lives an internal conflict as she yearns for the life she once lived with her family, while also attempting to establish a new identity in the United States. Blasim's narrative centers around a protagonist who experiences a profound internal conflict manifested via recurring nightmares pertaining to his Iraqi ethnicity. This study examines the subject matter via the lenses of psychology and postcolonial theory.
A series of new imides compounds[1-4] were synthesized from reaction of tetrachlorophthalic anhydride or nitro phthalic anhydride or malic anhydride or Succinic anhydride with 4-amino benzene thiol under fusion conditions. Chloroacetic acid has been added after compounds [1-4] reacted with distilled H2O and Na2CO3, producing compounds [5-8]. In benzene, compounds [5-8] also interacted with the thionyl chloride to produce [9-12]. Poly (vinyl alcohol) was chemically modified by reacting PVA with compounds [9-12] and dimethyl formamide to produce compounds [13-16]. Iron oxide nanoparticles (IONPs) are mixed with modified PVA [13-16] to create nanocomposites [17-20]. Spectral and analytical data from synthesized compounds, such as 1H-NMR, FTI
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show Moreهدفت الدراسة الى التعرف على درجة اتخاذ القرار وعلاقتها ببعض المهارات الأساسية الهجومية بكرة السلة للطالبات ، اذ يعد اتخاذ القرار قدرة الفرد على التوصل لحل مشكلة اعتراضية أو موقف محير، وذلك باختيار حل من البدائل الموجودة أو المبتكرة، وهذا الاختيار يعتمد على المعلومات التي جمعها الفرد حول المشكلة وعلى القيم والعادات والخبرة والتعليم والمهارات الفردية وتمتاز لعبة كرة السلة بوجود الكثير من المواقف المتغ
... Show MoreSemiconductor quantum dots (QDs) have attracted tremendous attentions for their unique characteristics for solid-state lighting and thin-film display applications. A simple chemical method was used to synthesis quantum dots (QDs) of zinc sulfide (ZnS) with low cost. The XRD) shows cubic phase of the prepared ZnS with an average particles size of (3-29) nm. In UV-Vis. spectra observed a large blue shift over 38 nm. The band gaps energy (Eg) was 3.8 eV and 3.37eV from the absorption and photoluminescence (PL) respectively which larger than the Eg for bulk. QDs-LED hybrid devices were fabricated using ITO/ PEDOT: PSS/ Poly-TPD/ ZnS-QDs/ with different electron transport layers and cathode of LiF/Al layers. The EL spectrum reveals a bro
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThe high cost of chemical analysis of water has necessitated various researches into finding alternative method of determining portable water quality. This paper is aimed at modelling the turbidity value as a water quality parameter. Mathematical models for turbidity removal were developed based on the relationships between water turbidity and other water criteria. Results showed that the turbidity of water is the cumulative effect of the individual parameters/factors affecting the system. A model equation for the evaluation and prediction of a clarifier’s performance was developed:
Model: T = T0(-1.36729 + 0.037101∙10λpH + 0.048928t + 0.00741387∙alk)
The developed model will aid the predictiv
... Show MoreWith the development of communication technologies, the use of wireless systems in biomedical implanted devices has become very useful. Bio-implantable devices are electronic devices which are used for treatment and monitoring brain implants, pacemakers, cochlear implants, retinal implants and so on. The inductive coupling link is used to transmit power and data between the primary and secondary sides of the biomedical implanted system, in which efficient power amplifier is very much needed to ensure the best data transmission rates and low power losses. However, the efficiency of the implanted devices depends on the circuit design, controller, load variation, changes of radio frequency coil’s mutual displacement and coupling coef
... Show More