Preferred Language
Articles
/
SRbo74sBVTCNdQwCguZy
Promoting Peace by Althusserian and Foucauldian Reading ofLiterature: Sinan Antoon’s I’jaam

This study seeks to investigate Sinan Antoon’s I’jaam (2004) through applying different theoretical frameworks including those of Althusser (1971) and Foucault (1978). Antoon, considered as one of the most internationally recognized Iraqi writers, wrote this dystopian, war novel in Arabic and translated it to English. Antoon’s emphasis placed on literature acting as an oppositional political voice has, in turn, created its own form of censorship inside the fictional world and outside the actual state censorship during Saadm Hossein reign. Thus, particular political messages within literary texts, like I’jaam, have been received with critical attention. The writing culture in Iraq has established an atmosphere in which literary critics and authors have valued specific types of texts that deal with social and political themes. I’jaam’s background reveals how in the twentieth century, the world has become an ever more violent place; the growth of ethnic and sectarian conflicts, the rise of extremist movements and censorship have increasingly trapped people in an unending chaos and violence. For numerous generations, Iraq has been suffering from a long history of war and violence. Accordingly, this paper aims to establish a bond between Althusserian and Foucauldian frameworks in order to analyze war and peace dichotomy and to reflect on such themes that shape the backbone of I’jaam. It is concluded that fulfilling basic human needs such as the sense of justice, freedom of speech and physical and financial security will serve to mitigate desires for revenge among victims and will help to diffuse inter-community tensions.

Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Effect of sintering time on Bi1.6Pb0.4Sr1.8Ba0.2Ca2Cu3O10+? compound quenched in air and liquid nitrogen

High temperature superconductor with nominal composition Bi1.6Pb0.4Sr1.8Ba0.2Ca2 Cu3O10+? was prepared by solid state reaction method. Two sets of samples have been prepared .The first one was quenched in air; the second set was quenched in liquid nitrogen. X-ray diffraction analyses showed an orthorhombic structure with two phases, high –Tc phase (2223) and low-Tc phase (2212) in addition to that impure phase was found. It has been observed that quenched in air samples display a sharp superconducting transition and a higher-Tc phase than that of the quenched in liquid nitrogen samples.

Crossref
View Publication Preview PDF
Publication Date
Wed Jun 26 2019
Journal Name
Iraqi Journal Of Science
Quantum Key Distribution and Chaos Bandwidth Effects on Impact Security of Quantum Communications

The influence of bias current on the bandwidth of chaotic signals in semiconductor lasers by optical feedback has been studied experimentally and numerically. The measured data reveal that the bandwidth increase when the system becomes chaotic and this chaotic signal has a broadband spectrum so it can be used as a carrier for the quantum key. Mixing chaotic signal and quantum key make a very small change in chaotic bandwidth that does not affect the security of data transmitted.

Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Jan 13 2022
Journal Name
Iraqi Journal Of Science
Association between MethylenetetrahydrofolateReductase (MTHFR) GenePolymorphisms and breast cancer in sample of Iraqi women

Folate metabolism is fundamental and essential for DNA structure synthesis and repair. Change in genes that participate in folate metabolism can be linked with different types of malignant tumor, Therefore, this study was conducted to find out the association between methylenetetrahydrofolatereductaseMTHFR gene polymorphisms and risk of breast cancer in a sample of Iraqi patients. One Single Nucleotide Polymorphism ( SNP) including MTHFR C677T was calculated using a tetra primer ARMS PCR experiment assay. The results explained that (MTHFR C677T) consists of three genotype (CC, CT, TT), The CC genotype was the most frequent in patients and control group ( 40.00%) and(60.00%) ,respectively, while the lowest frequency was for TT genotype(26

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 22 2020
Journal Name
Clinical And Experimental Dental Research
Prevalence and factors influencing reporting of true periodontal chief complaints: A retrospective analysis
Abstract<sec><title>Objectives

To investigate the prevalence of true periodontal chief complaints (CC) and the factors affecting their reporting by patients with periodontal diseases (PD).

Materials and Methods

This cross‐sectional study was based on retrospective analysis of available periodontal records. Different personal and demographic variables were obtained from these records including CC, age, gender, working status, past medical/dental history, smoking status and diagnosis. In addition, clinical parameters of plaque index, gingival index, probing pocket depth (PPD), and number of missing teeth. Periodontal CC were r

... Show More
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Tue Apr 25 2023
Journal Name
Journal Of Periodontal Research
Salivary E‐cadherin as a biomarker for diagnosis and predicting grade of periodontitis
Abstract<sec><title>Objectives

To determine the abilities of salivary E‐cadherin to differentiate between periodontal health and periodontitis and to discriminate grades of periodontitis.

Background

E‐cadherin is the main protein responsible for maintaining the integrity of epithelial‐barrier function. Disintegration of this protein is one of the events associated with the destructive forms of periodontal disease leading to increase concentration of E‐cadherin in the oral biofluids.

Materials and Methods

A total of 63 patients with periodontitis (case) and 35

... Show More
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Structures
Horizontal pushout tests and parametric analyses of a locking-bolt demountable shear connector

A ‘locking-bolt’ demountable shear connector (LBDSC) is proposed to facilitate the deconstruction and reuse of steel-concrete composite structures, in line with achieving a more sustainable construction design paradigm. The LBDSC is comprised of a grout-filled steel tube and a geometrically compatible partially threaded bolt. The latter has a geometry that ‘locks’ the bolt in compatible holes predrilled on the steel flange and eliminates initial slip and construction tolerance issues. The structural behaviour of the LBDSC is evaluated through nine pushout tests using a horizontal test setup. The effects of the tube thickness, strength of concrete slab, and strength of infilled grout on the shear resistance, initial stiffness, and du

... Show More
Scopus (20)
Crossref (21)
Scopus Clarivate Crossref
View Publication
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Topology-Based Modularity and Modularity Density for Detecting Protein Complexes: A Comparative Study

     Binary relations or interactions among bio-entities, such as proteins, set up the essential part of any living biological system. Protein-protein interactions are usually structured in a graph data structure called "protein-protein interaction networks" (PPINs). Analysis of PPINs into complexes tries to lay out the significant knowledge needed to answer many unresolved questions, including how cells are organized and how proteins work. However, complex detection problems fall under the category of non-deterministic polynomial-time hard (NP-Hard) problems due to their computational complexity. To accommodate such combinatorial explosions, evolutionary algorithms (EAs) are proven effective alternatives to heuristics in solvin

... Show More
Scopus Crossref
View Publication
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
Crossref
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
View Publication
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
Crossref
View Publication