This study aims to examine how the lives of blacks are reduced and eliminated in Brother (2017) by David Chariandy. Black Lives Matter is a hash tag that appears after the killing of Trayvon Martin (17 years old African American) in 2012 by the savage hands of George Zimmerman (white person). This hash-tag has become a social movement that calls for equality in order to stop the violence against black people because their live is as valuable as white’s. The movement comes into being to highlight the “hypocritical democracy in service to the white males whose freedom are openly depended upon the oppression of blacks” (Lebron, 2017, P. 1). Those who have started this movement try to redeem a state and its arbitrary actions against black who are exterminated since the slavery. Alicia Graza, Patrisse Cullors, and Opal Tometi have established this movement to reveal the suffering of the blacks who have no rights to live their life. Chariandy is a Canadian writer who specialized in Caribbean literature, black diaspora, and postcolonial studies. The novel is analyzed through Kimberlé Crenshaw’s concept (intersectionality) to show how the race, gender, and class are intersecting together to emphasize how the human beings will be treated accordingly.
The densities and visconsities of solutions of poly(vinyl alcohol)(PVA) molccuar weight (14)kg.mol-1in water up to 0.035%mol.kg-1
The internet of medical things (IoMT), which is expected the lead to the biggest technology in worldwide distribution. Using 5th generation (5G) transmission, market possibilities and hazards related to IoMT are improved and detected. This framework describes a strategy for proactively addressing worries and offering a forum to promote development, alter attitudes and maintain people's confidence in the broader healthcare system without compromising security. It is combined with a data offloading system to speed up the transmission of medical data and improved the quality of service (QoS). As a result of this development, we suggested the enriched energy efficient fuzzy (EEEF) data offloading technique to enhance the delivery of dat
... Show MoreThis research deals with the qualitative and quantitative interpretation of Bouguer gravity anomaly data for a region located to the SW of Qa’im City within Anbar province by using 2D- mapping methods. The gravity residual field obtained graphically by subtracting the Regional Gravity values from the values of the total Bouguer anomaly. The residual gravity field processed in order to reduce noise by applying the gradient operator and 1st directional derivatives filtering. This was helpful in assigning the locations of sudden variation in Gravity values. Such variations may be produced by subsurface faults, fractures, cavities or subsurface facies lateral variations limits. A major fault was predicted to extend with the direction NE-
... Show MoreThis article investigates the decline of language loyalty in the age of audiovisual nearness. It is a socio-linguistic review of previous literature related to language disloyalty. It reviews the current theoretical efforts on the impact of audiovisual nearness created by social media and language loyalty. The descriptive design is used. The argument behind this review is that the audiovisual nearness provided by social media negatively affects language loyalty. This article concludes that the current theoretical efforts have paid much attention to the relationship between the audiovisual nearness and language loyalty. Such efforts have highlighted the fact that the social media platforms have provided unprecedented nearness that provoke in
... Show MoreBackground: Odontogenic cysts include a group of osseodestructive lesions that frequently affect the jaws. Those cysts could derive from odontogenic epithelium and occur in the tooth-bearing regions of the jaws. The aims of this study were to evaluate the immunohistochemical expression of Cyclin D1 in Keratocystic Odontogenic Tumor, Dentigerous cyst and Radicular cyst in epithelium and connective tissue capsule. Materials and Methods: In this study, thirty formalin fixed paraffin embedded tissue blocks of Odontogenic cysts and Tumor, consist of 14 Keratocystic Odontogenic Tumor, 8 dentigerous cysts and 8 radicular cysts were analyzed immunohistochemically for the presence of Cyclin D1 proteins. Results: Strong to moderate expression of Cy
... Show MoreThe internet of medical things (IoMT), which is expected the lead to the biggest technology in worldwide distribution. Using 5th generation (5G) transmission, market possibilities and hazards related to IoMT are improved and detected. This framework describes a strategy for proactively addressing worries and offering a forum to promote development, alter attitudes and maintain people's confidence in the broader healthcare system without compromising security. It is combined with a data offloading system to speed up the transmission of medical data and improved the quality of service (QoS). As a result of this development, we suggested the enriched energy efficient fuzzy (EEEF) data offloading technique to enhance the delivery of dat
... Show MoreNowadays, cloud computing has attracted the attention of large companies due to its high potential, flexibility, and profitability in providing multi-sources of hardware and software to serve the connected users. Given the scale of modern data centers and the dynamic nature of their resource provisioning, we need effective scheduling techniques to manage these resources while satisfying both the cloud providers and cloud users goals. Task scheduling in cloud computing is considered as NP-hard problem which cannot be easily solved by classical optimization methods. Thus, both heuristic and meta-heuristic techniques have been utilized to provide optimal or near-optimal solutions within an acceptable time frame for such problems. In th
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More