The other is a problematic concept and can be achieved only by the existence of difference and differentiation between human groups in views and views, the other is out of the ego, which is different religiously, politically, socially, culturally, place and language.
We take from the Iraqi feminist novel analytical field to reflect the image of the other in the novelist world, and the models chosen for the study are: the novel granddaughter of American novelist Anaam Kjie Ji, and novel how the sky seemed close to the novelist Batoul al-Khudairi, and novel when you wake up the smell of novelist Dni Ghali, and the rope of the umbilical and the novel Shufuni Shufuni The novel by Samira Al-Manea, the novelist of the novelist Alia Mamdouh,
The Legend between reality and its future Treatment in threatre analytics study
This research presents the kinetics of the saponification reaction using mixed fats of olein and stearin [in the ratio (3:1)] with NaOH solution. In this reaction, excess solution of NaOH was used to ensure the reaction being irreversible. Three parameters were varied to show their effects on the reaction rate .They are: percentage excess of NaOH solution (10 % - 100 %) , temperature (100-150)oC , and stirring speed (400-1100) rpm. It was noticed that increasing the percentage excess of NaOH solution enhances the rate of reaction while increasing temperature decreases the reaction rate since it is exothermic reaction. Increasing stirring speed also improves the reaction rate because it is mass transfer controlled .Calcu
... Show MoreBiomimatic basic calcium phosphate ,known as Hydroxy apatite(HA), was
synthesised using calcium acetate and disodium phosphate dilute hot (boiling) solution of
both salts were added slowly to each other. A colloidal suspension formed was aged for few
days, then boiled for one hour to induced setting and coagulation of preapatite, and left to cool
until they reached room temperature.
The precipitate was filtered and washed with distilled water, then ethanol and dried.
The dried sample was calcined at 1100
o
C.The obtained solid lumps were then crushed
reground fine powder and analyzed for calcium to phosphorous ratio. X-ray analysis was
carried out to examine the solid sample. Chemical analysis for phos
In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreThis investigation aims to study some properties of lightweight aggregate concrete reinforced by mono or hybrid fibers of different sizes and types. In this research, the considered lightweight aggregate was Light Expanded Clay Aggregate while the adopted fibers included hooked, straight, polypropylene, and glass. Eleven lightweight concrete mixes were considered, These mixes comprised of; one plain concrete mix (without fibers), two reinforced concrete mixtures of mono fiber (hooked or straight fibers), six reinforced concrete mixtures of double hybrid fibers, and two reinforced concrete mixtures of triple hybrid fibers. Hardened concrete properties were investigated in this study. G
Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreThis work implements an Electroencephalogram (EEG) signal classifier. The implemented method uses Orthogonal Polynomials (OP) to convert the EEG signal samples to moments. A Sparse Filter (SF) reduces the number of converted moments to increase the classification accuracy. A Support Vector Machine (SVM) is used to classify the reduced moments between two classes. The proposed method’s performance is tested and compared with two methods by using two datasets. The datasets are divided into 80% for training and 20% for testing, with 5 -fold used for cross-validation. The results show that this method overcomes the accuracy of other methods. The proposed method’s best accuracy is 95.6% and 99.5%, respectively. Finally, from the results, it
... Show More