Intersectionality is a concept that focuses on social inequality towards black people and provides an analytical instruments for creating social justice issues in such a way in order to depict how social marginalization, or privilege occurs differently in various social positions. It does this by focusing on the interaction of multiple systems of oppression. Intersectionality is used to examines how the social factors; race, gender, and class can affect the people’s life especially the immigrants, black people, and refuges. This article will depicts how blacks in Canada are segregated and distinguished from white race. David Chariandy’s I’ve Been Meaning To Tell You: A Letter to My Daughter 2018 is analyzed through Kimberle Crenshaw’s concept (intersectionality) by using postcolonial theory to show how person with a different race, class, and gender can be bullied and eliminated from many benefits.
Empirical equation has been presented to predict the optimum hydrodynamic
pressure gradient with optimum mud flow rate (one equation) of five Iraqi oil wells
to obtain the optimum carrying capacity of the drilling fluid ( optimum transport
cuttings from the hole to the surface through the annulus).
This equation is a function of mud flow rate, mud density and penetration
rate without using any charts or graphs.
The correlation coefficient accuracy is more than 0.9999.
The importance of knowledge is represented in the use of various sources of information, the corresponding to the same level of importance is the use of modern means and technologies in the delivery and investment of these sources to the beneficiaries, among these means and technologies are the multimedia that deal with most of the human senses, but the most important of which is sight and hearing, if these are invested the means in the field of education will give many positive results, such as the speed of receiving information, its clarity, and its freedom from impurities and influences, as well as its stability in memory as it is based on nderstanding, not memorization. On this basis, the experience of supporting the education process
... Show MoreThe current study used extracts from the aloe vera (AV) plant and the hibiscus sabdariffa flower to make Ag-ZnO nanoparticles (NPs) and Ag-ZnO nanocomposites (NCs). Ag/ZnO NCs were compared to Ag NPs and ZnO NPs. They exhibited unique properties against bacteria and fungi that aren't present in either of the individual parts. The Ag-ZnO NCs from AV showed the best performance against E. coli, with an inhibition zone of up to 27 mm, compared to the other samples. The maximum absorbance peaks were observed at 431 nm and 410 nm for Ag NPs, at 374 nm and 377 nm for ZnO NPs and at 384 nm and 391 nm for Ag-ZnO NCs using AV leaf extract and hibiscus sabdariffa flower extract, respectively. Using field emission-scanning electron microscopes (FE-
... Show MoreThe D.C electrical and thermoelectrically properties of randomly mixed isolator – electrolyte system as (Al/ PVC – LiF/Al) junction consisting of polyvinyl chloride (PVC)resin reinforced with Lithium Fluoride (LiF) powder were studied. A comparison is made the properties of (PVC) material with varying percentage of (LiF) powder (0%, 30%, 50%, 80%)to find out the effect of reinforcement of isolator material. The composites dissolving in 10ml form tettraHaedroflourn (THF) and Solution were the castled in Petri dish and Laved it dry in the air, The out coming Sample were disc - Like shape of a diameter of about 3cm and thickness reneged between (0.01- 0.018) cm . The composites dissolving in 10ml form tettraHaedroflourn (THF) a
... Show MoreThis research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB
... Show MoreThis work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).
Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors. The RNG k-ε model of turbulence is used to determining the accurate results from CFD.
The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o
... Show MoreThis paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreAn aircraft's landing stage involves inherent hazards and problems associated with many factors, such as weather, runway conditions, pilot experiences, etc. The pilot is responsible for selecting the proper landing procedure based on information provided by the landing console operator (LCO). Given the likelihood of human decisions due to errors and biases, creating an intelligent system becomes important to predict accurate decisions. This paper proposes the fuzzy logic method, which intends to handle the uncertainty and ambiguity inherent in the landing phase, providing intelligent decision support to the pilot while reducing the workload of the LCO. The fuzzy system, built using the Mamdani approach in MATLAB software, considers critical
... Show MoreMany complexes of 3,5-dimethyl-1H-pyrazol-1-yl phenyl methanone with Cr(III), Co(II), Ni(II), Cu(II) and Cd(II) were synthesized and characterized by FT-IR, UV/visible spectra, elemental analysis, room temperature magnetic susceptibility and molar conductivity. Cd(II) complex was expected to have tetrahedral structure while all the other complexes were expected to have an octahedral structure.