September 11th attacks held the biggest tragedy in American history. It was a day of grief, and it proved that America was not immune to attacks and threat. Afterwards life has changed not only for the American Muslims but also American Christians and Jews and to people from other religions. The cruelty of that day has left its shed particularly on the Muslims’ life in America who in reality had nothing to do with the attacks. Arab American Muslim writer Laila Halaby’s novel, Once in a Promised Land, intensely displays the problems that Arab Muslims went through after September 11th attacks. This paper discusses this issue through analysing Halaby’s novel, where she deals with the issues such as discrimination, stereotype, and prejudice. This paper presents the two main characters of the novel Salma and Jassim and the crisis they encountered after the attacks.
Photorefractive keratectomy (PRK) is the refractive technique that began with a physical scraping of the epithelial layer of cornea subsequent by laser treatment. Post this procedure to about 48 hours the removed epithelial layer regenerated to protect the eye again. The regeneration process (called re-epithelization) started from the limbus of the cornea toward the central part of it. The re-epithelization mechanism consists of a change in cell density (mitosis) and cell concentration (migration) with a velocity in two directions: radial and tangential. In the present study, an estimation for both radial (responsible for the overlapped layers toward the outward direction of the cornea) and tangential comp
... Show MoreThe general objective of the research is to better understand changes in land cover and their impact on climatic factors by measuring changes in land cover for the Baghdad city for the period 1999-2021 and evaluating changes in land cover and measuring changes in climatic factors (relative humidity and evaporation). This study from 1999 to 2021 and in two different seasons: the April of the growing season and August the dry season. When using the supervised classification method to determine the differences, the results showed remarkable changes, the study showed the spatial variations in LC from 1999 to 2021 as follows: increase in the vegetation and water bodies during April and decrease this in August while the soil and built up decreas
... Show MoreThe study of homomorphisms in cubic sets is considered one of the important concepts that transfer algebraic properties between different structures, so we study a homomorphism of a cubic set of a semigroup in a KU-algebra and defined the product of two cubic sets in this structure. Firstly, we define the image and the inverse image of a cubic set in a KU-semigroup and achieve some results in this notion. Secondly, the Cartesian product of cubic subsets in a KU-semigroup is discussed and some important characteristics are proved.
Acquisition provisions in Islamic jurisprudence
Identity is an influential and flexible concept in social sciences and political studies. The basic sense of identity is looking for uniqueness. In one sense, it is a sign of identification with those we assume they are similar to us or at least in some significant ways they are so. Globalization, migration, modern technologies, media and political conflicts are argued to have a crucial effect on identity representation in terms of the political perspectives specifically in the United States of America. This paper endeavors to investigate how American politicians represent their identities in speeches delivered in different periods of time namely from 2015 to 2018 in terms of the pragmatic paradigm. Three randomly selected speeches by fa
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The polygamy as a social was known before Islam, has kept Islam on this system after it organized and put his controls and conditions, as justice between wives and the ability to alimony, it was not the purpose of satisfying the instinct of man and enjoyment, but his goal nominal than that, because it addresses problems humanity has goals noble, so the pluralism overlap of the fabric of families belonging to governance and benefits for women and men and society, which leads to increased ties of love between people of the same society and thus increases the cohesion and importance of the topic and its association with financial conditions have emerged as needed so you viewed in the second scientific Conference of the Department social Ser
... Show MoreLabor movement is considered important in Britain because it is an international phenomenon of the feudal system and one of the flowerings of the era of the capitalist machine. At the beginning of the 18th century, the world witnessed a change and progress in many aspects of the industrial fields such as the different means of production .this era is called the industrial revolution which especially appeared in Britain and extended to other areas of the world .it leads to many changes in Europe and participated in different economic, political and cultural and social fields. and it has a very important role in progress and development but its disadvantage is that it is exploited by the capitalists to achieve their special rights .in othe
... Show More
