This study is intended to examine the concept of transcultural identity in the travel book The Global Soul: Jet Lag, Shopping Malls, and the Search for Home by (Iyer, 2001). Jeffries’ model of critical stylistics (2010) (henceforth, CS) has been selected to analyze the book. To be more specific, Negation is selected to analyze the concept under study. As such, the study aims at finding out how Negation is used to portray ideological meanings representing the concept of transcultural identity in one non-fictional travel book; and finding out the ideologies related to the concept analyzed. The analysis of the data shows that Negation is a suitable analytical tool to reach the ideational meaning of the text towards the concept of transcultural identity. It is also a powerful tool that provides a means for a coherent and rigorous discussion for the analysis of identity. Besides, the concept of transcultural identity, as the analysis shows, is used to reveal the ideologies of homelessness, identity globalization, spiritual connectedness, imagined homes, etc. The importance of the study stems from being an attempt to investigate transcultural identity using a critical stylistic approach which constitutes a gap in the literature since such a study of transcultural identity is very rare or even nonexistent.
Codes of red, green, and blue data (RGB) extracted from a lab-fabricated colorimeter device were used to build a proposed classifier with the objective of classifying colors of objects based on defined categories of fundamental colors. Primary, secondary, and tertiary colors namely red, green, orange, yellow, pink, purple, blue, brown, grey, white, and black, were employed in machine learning (ML) by applying an artificial neural network (ANN) algorithm using Python. The classifier, which was based on the ANN algorithm, required a definition of the mentioned eleven colors in the form of RGB codes in order to acquire the capability of classification. The software's capacity to forecast the color of the code that belongs to an object under de
... Show MoreSeveral stress-strain models were used to predict the strengths of steel fiber reinforced concrete, which are distinctive of the material. However, insufficient research has been done on the influence of hybrid fiber combinations (comprising two or more distinct fibers) on the characteristics of concrete. For this reason, the researchers conducted an experimental program to determine the stress-strain relationship of 30 concrete samples reinforced with two distinct fibers (a hybrid of polyvinyl alcohol and steel fibers), with compressive strengths ranging from 40 to 120 MPa. A total of 80% of the experimental results were used to develop a new empirical stress-strain model, which was accomplished through the application of the parti
... Show MoreAccording to Chandra Survey Observatory Near-Asteroid Belt Comets, the solar wind's contact with the comet produces a variety of spectral characteristics. The study of X-ray spectra produced by charge exchange is presented here. The spectrum of a comet can reveal a lot about its composition. This study has concentrated on the elemental abundance in six different comets, including 17P/Holmes, C/1999T1, C/2013A1, 9p/Temple1, and 103p/Hartley2 (NEAT). Numerous aspects of the comet's dynamics allow it to behave in a unique manner as it gets closer to the Near-Asteroid Belt. These characteristics are being examined, and some studies are still ongoing. The computations allow us to observe, for instance, how the composition of
... Show MoreAHHAN Al, AMAA Fatlawi, HAAN Al-Fatlawi…, Pakistan Heart Journal, 2023
— In light of the pandemic that has swept the world, the use of e-learning in educational institutions has become an urgent necessity for continued knowledge communication with students. Educational institutions can benefit from the free tools that Google provide and from these applications, Google classroom which is characterized by ease of use, but the efficiency of using Google classroom is affected by several variables not studied in previous studies Clearly, this study aimed to identify the use of Google classroom as a system for managing e-learning and the factors affecting the performance of students and lecturer. The data of this study were collected from 219 members of the faculty and students at the College of Administra
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MorePorosity plays an essential role in petroleum engineering. It controls fluid storage in aquifers, connectivity of the pore structure control fluid flow through reservoir formations. To quantify the relationships between porosity, storage, transport and rock properties, however, the pore structure must be measured and quantitatively described. Porosity estimation of digital image utilizing image processing essential for the reservoir rock analysis since the sample 2D porosity briefly described. The regular procedure utilizes the binarization process, which uses the pixel value threshold to convert the color and grayscale images to binary images. The idea is to accommodate the blue regions entirely with pores and transform it to white in r
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreThis study was aimed to explore the impact of a practical program on supporting and reducing
symptoms of school bulling victims in a sample of student in the sixth grade. The study sample consisted of (18)
students that have been chosen from two schools (Al-Abass and Alataa’) it was an intended sample, because
there were enough student with high scores in bulling victims diagnostics test, the sample was divided into two
groups: the control group of (9) student from (Alataa’) school, and the experimental group consisted of (9)
student from Alabass) school keeping in mind to keep the two groups equivalent in maintaining equal controls.
The researcher applied the practical program which is based on cognitive behavioral
The aims of this study to diagnose the role of the (relationship and impact) Academic driving practices dimensions (model the way, inspire a shared vision, challenge the process, enable others to act, encourage the heart ) in the activation of human capital (investment and development) for (knowledge, skills, expertise, creative and training capabilities) in a sample of university professors in Baghdad city(Baghdad University, Al Mustansiriya University, University of Technology). (367 )samples were distributed to (232 at the University of Baghdad, 97 at Al-Mustansiriya University and 38 at the University of Technology). The goals of descriptive analytical method research have been used, questionnaire has been a main tool for dat
... Show More