Preferred Language
Articles
/
TBaQ54sBVTCNdQwCVORn
“Actual Experience”: Correcting Misconceptions Through Analyzing Harriet Wilson’s Our Nig

African-American writers during the 19th century wrote in the shadow of the prominent romance, sentimental, and domestic fiction. Harriet Wilson’s Our Nig (1859) reflects an “alternative social character”, for the female protagonist suffers racism in the free North, because she is a mulatto child. Through depicting the life of free blacks, who supposedly lives a better life than Southern slaves, Wilson exposes how she has actually lived and sensed life in antebellum America. According to Raymond Williams (2011), there are two kinds of literary writings. The first represents the general tendency of the age, and he calls it “dominant social character”; representing the majority content of both the public writing and speaking. But, another different literary writing lives in its shadow; one that usually leads the conflicts of the time. It is the “alternative social character”; the literature of the victims of repression and marginalization, produced by the lower class, women, and blacks. They reflected how they were dehumanized, and exposed their suffering and abasement. They also aimed to prove individualism. The novel reveals how racism in the North could be worse than the slavery of the South. This paper shows Wilson deviation from the “her brethren” in writing her novel. It unveils significant truths concerning black women’s status in antebellum America. It discusses how the author attempts to correct certain misconceptions through her female character.

View Publication
Publication Date
Thu Oct 01 2009
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Initial Experience of Dobutamine Stress Echocardiography in Ibn Al-Bitar Hospital for Cardiac Surgery

Background: Dobutamine stress echocardiography (DSE) is a well established non invasive test for the diagnosis and risk stratification of patients with coronary artery disease. Aim of the study was to conduct a pilot study in order to establish the basis for the future routine practice of DSE in our center (Ibn Al- Bitar Hospital for Cardiac Surgery).
Patients and Methods: Fifty consecutive patients who were referred from the outpatient of our center, from August 2007 to July 2008, were included. The age range was 39 – 70 years with an average of 57.18 years. Fifty-eight percent were males. Patients were enrolled in the study in accordance with the American Heart Association/ American College of Cardiol

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue Jun 30 2015
Journal Name
College Of Islamic Sciences
Structural and contextual dimensions of the coming   Intervals Between that diluted and her experience

In the name of of Allah the Merciful
Praise be to Allah, Lord of the Worlds, and prayers and peace be upon the Seal of the Prophets and Messengers. The envoy is a mercy to the worlds Muhammad Sadiq Al - Amin, and to the pure and good companions of the Tayyibites.
The formula of the morphological formulas, which have diverged from other meanings, whether lexicon or contextual and what this formula contains many meanings (effective source) and (effective in the sense of effective) and (effective sense reactor) and (effective sense) and ( (F) in the sense of a similar character) and ((the name of the) (collect). This was dealt with in the formula in Surat al-Nisaa a gramophone study. As mentioned in the study of the morphological subj

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 31 2016
Journal Name
Al-kindy College Medical Journal
Comparison between Open Mini-incision Thyroidectomy and Conventional Thyroidectomy: Clinical Experience and Literatures Review

Background: Thyroid surgery is most common endocrine surgery in general surgical practice. Objectives: the aim of this work is to evaluate the feasibility, benefits and outcomes of open mini-incision thyroidectomy and compared the results with that of conventional thyroidectomy. The comparison between the two groups was in term of incision length, amount of blood loss, time of operation, postoperative pain, hospital stay and the cosmetic outcomes.Type of the study: this is a single-blinded randomized controlled studyMethods: This study compared the advantages and outcomes of 22 patients subjected to mini-incision thyroidectomy (Group A) with the equal numbers of patients subjected to conventional thyroidectomy (Group B).Results: the oper

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 01 2008
Journal Name
Journal Of Engineering
Publication Date
Sat Jan 01 2022
Journal Name
Geotechnical Engineering And Sustainable Construction
Crossref
View Publication
Publication Date
Thu Jun 25 2020
Journal Name
Aip Conference Proceedings
Publication Date
Sun May 01 2022
Journal Name
Rimak International Journal Of Humanities And Social Sciences
BUILDING THE MEDIA MESSAGE AND DESIGNING IT THROUGH INFOGRAPHICS

The study aims to identify how to build the media message in an artistic design style (infographic) to reach the mechanism of building the media message by infographic in the researched news sites. For the survey method, which is one of the best methods used to study the subject of the research, the researcher used the method of content analysis, the employee of the research tool, a quantitative and qualitative content analysis form for the study of 74 infographics that appeared during the research period in the research sample sites. The study revealed a number of results, most notably 1. The surveyed sites employed the information in a manner based on images, shapes and data, that is, through the use of the visual element and the

... Show More
Crossref
View Publication
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
Scopus (3)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Mining Deviations in Document Writing Style through Vector Dissimilarity

     Doubts arise about the originality of a document when noticing a change in its writing style. This evidence to plagiarism has made the intrinsic approach for detecting plagiarism uncover the plagiarized passages through the analysis of the writing style for the suspicious document where a reference corpus to compare with is absent.      The proposed work aims at discovering the deviations in document writing style through applying several steps: Firstly, the entire document is segmented into disjointed segments wherein each corresponds to a paragraph in the original document. For the entire document and for each segment, center vectors comprising average  weight of their word  are constructed. Second, the degree of cl

... Show More
Scopus Crossref
View Publication
Publication Date
Tue Dec 15 2020
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees20
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
View Publication