Abstract This study aims to compare British war poetry of the First World War with Iraqi poetry from the mid-20th century with special reference to Iraqi war poetry of the 1980’s Iraq-Iran War and the period that followed it. It will also investigate the influence of the designated British war poetry on the chosen body of Iraqi poetry. Through the comparison of sample poems the study presents, firstly, the direct influence of the British poetry of the Great War and its translation which formed the seeds of a more radical movement in Iraqi poetry during the 1980’s Iran/Iraq War and the period that followed it. The study also presents a comparison of the works of British and Iraqi civilian poets during and after the war time and their contribution in setting the ground for the younger generation to create more subversive poetic forms with special reference to women as influential characters and inspirations in their works. The moment of the 1980’s war marks the break with the clear direct influence of British war poetry and starts another phase of the comparison of a universal bond of similar reactions, conscious and unconscious expression reflecting the lives of the combatant group of men first and then of poets sharing a devastating war reality. The study reveals a remarkable, more radical change of poetic forms in Iraqi poetry between the time of the first seeds planted by the influence of translations from European poetry until the time of the Iran/Iraq war and the Gulf War in 1991 and the rise of the new nihilistic generation of the 1990s subverting war, politics and cultural life through their innovation in prose poem writing and its significance as an alternative space for their political and social subversion.
Researching the effects of the research and technological development contract, determining its extent and demarcating the boundaries of the obligations imposed in it, is the cornerstone of economic growth and development, because defining these obligations removes the ambiguity and conflict between interests, by stating the rights owed to each party and even trying to reconcile them, or impose protection by specifying guarantees that are compatible with the essence of the R&D contract, For the purpose of studying the subject thoroughly, we will divide this research into two sections. The first is devoted to identifying the parties to the research and technological development contract. As for the other topic, we will explain the obligation
... Show MoreTeaching through the system of personal learning, known as (Clare's plan) is amongst the most prominent plans which depend on self-education, as it received worldwide recognition. The plan lets the learner achieve learning by depending on himself after being familiar with the educational goals given to him, then he starts to solve the exercises and the drills accompanying the unit. After that, he checks his achievement by answering the self-evaluation tests. This method offers more opportunities for personal interaction than do the traditional systems, and individual leaning is a methodical expression aims at taking care of the learner and making him the locus of the processes of teaching and learning.
Aims of the study
... Show MoreThe first chapter the importance of research and need for education scientists see that the roots of the use of a specimen Wheatley in learning and teaching back to Grayson Wheatley, one of the largest supporters of a modern construction, which lay the groundwork for the specimen stage and the form in which it is. That was attributed to him, often called his name called while some educators based learning strategy on the issue. He sees the learner in this model make him a meaningful understanding of problems during his progress, thereby acting with his colleagues to find solutions to them in small groups. He
Borders Search: Search by students is determined by th
... Show MoreObjective(s): In the present study, glycerin is used as a substitute for tin-foil and cold mold seal (Alginate mould seal)
in the process of curing heat and cold-cure acrylic resin denture base against stone and plaster.
Methodology: 60 specimens were prepared from heat-cure acrylic resin and cold-cure acrylic resin denture base. The
study includes 12 groups of specimens depending on the type of processing, investment material and type of
separating medium that are used in curing process. Each group of them contains 5 specimens for each test.
Some of physical properties of the processed acrylic denture base that (water sorption and solubility) have been
compared with those processed using tin-foil and tin-foil substitut
Characterized Iraq, being one of the oldest countries where oil was discovered in the Middle East since 1927, and possess a vast oil reserves. In addition, the production and marketing of Iraqi oil continued since 1934 and until the present time. Over the past eight decades, the range of economic benefit of the financial Iraq’s oil resources varied according to the applicable forms of investments in the oil sector in Iraq.
This research included a study
... Show MoreNumerical simulations have been carried out on the solar chimney power plant systems. This paper gives the flow field analysis for a solar chimney power generation project located in Baghdad. The continuity, Naver-stockes, energy and radiation transfer equations have been solved and carried out by Fluent software. The governing equations are solved for incompressible, 3-D, steady state, turbulent is approximated by a standard k - model with Boussiuesq approximation to study and evaluate the performance of solar chimney power plant in Baghdad city of Iraq. The different geometric parameters of project are assumed such as collector diameter and chimney height at different working conditions of solar radiation intensity (300,450,600,750
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More