Preferred Language
Articles
/
fhcTVY4BVTCNdQwCA0Ku
Lingual Sovereignty: Chinua Achebe’s Novel Things Fall Apart A Postcolonial Study

The discourse surrounding lingual sovereignty within the African postcolonial context is profoundly intertwined with the fabric of cultural identity and self-determination. Language serves not merely as a conduit for communication but as a repository for a people's collective consciousness, encapsulating their traditions, thoughts, and perspectives. In the realm of postcolonial literature, this dialogue often grapples with the paradox of expressing indigenous narratives through the linguistic tools of former colonizers. Chinua Achebe's seminal work, "Things Fall Apart," exemplifies this conundrum, artfully weaving the orature and culture of Umuofia within the English language. Achebe's choice to write in English—a language imposed upon his native land through colonialism—does not diminish the sovereignty of his cultural expression. Instead, it serves as an act of subversion, repurposing the language to convey a narrative inherently African in its essence. This strategic use of English enables Achebe to reach a broader audience while simultaneously challenging imperialistic narratives. The novel stands as a testament to the fact that lingual sovereignty transcends the mere use of native tongues; it is embodied in the assertion of one's narrative and cultural truths, regardless of the medium.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
Scopus (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Feb 21 2017
Journal Name
Biomechanics And Modeling In Mechanobiology
A novel method for non-invasively detecting the severity and location of aortic aneurysms

The influence of an aortic aneurysm on blood flow waveforms is well established, but how to exploit this link for diagnostic purposes still remains challenging. This work uses a combination of experimental and computational modelling to study how aneurysms of various size affect the waveforms. Experimental studies are carried out on fusiform-type aneurysm models, and a comparison of results with those from a one-dimensional fluid–structure interaction model shows close agreement. Further mathematical analysis of these results allows the definition of several indicators that characterize the impact of an aneurysm on waveforms. These indicators are then further studied in a computational model of a systemic blood flow network. This demonstr

... Show More
Scopus (29)
Crossref (29)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Wed Mar 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
In vitro assessment of bracket adhesion post enamel conditioning with a novel etchant paste

Background: 37% phosphoric acid (PA) is the traditional enamel etching technique prior to bracket ‎adhesion, yet it has been implicated in numerous enamel injuries. The purpose of the current study was to create a calcium phosphate (CaP) etching paste in a ‎‎simplified capsule ‎formula that can underpin clinically ‎adequate bracket bond strength ‎without jeopardizing the ‎integrity of enamel upon ‎the debracketing procedure. Materials and Methods: micro-sized hydroxyapatite (HA) powder was mixed with 40% PA solution to prepare ‎experimental acidic CaP paste. Sixty human premolars were ‎assigned into two groups of 30 each. ‎Enamel conditioning was accomplished using 37% PA-gel‎ for control group and CaP paste for e

... Show More
Scopus (2)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Sep 24 2024
Journal Name
Arab World English Journal
A Critical Discourse Analysis of Women’s Representation in Maysaloon Hadi’s Novel The Black Eyes

This study applies a discourse analysis framework to explore the portrayal of women in Maysloon Hadi’s novel (The Black Eyes) (2011), using Critical Discourse Analysis (CDA) and Norman Fairclough’s tri-dimensional model (1989) as the analytical foundation. It investigates the roles and challenges women face in the novel. While there is growing interest in the portrayal of women in literature, Iraqi literature—especially from the perspective of Iraqi women writers remains underexplored. Hadi’s *The Black Eyes* provides a unique case to examine this intersection. Despite the novel’s rich narrative, which offers insight into Iraqi women’s lives, there is a lack of comprehensive CDA to understand how its language constructs

... Show More
Crossref
View Publication Preview PDF
Publication Date
Fri Jul 01 2016
Journal Name
Tetrahedron
Scopus (21)
Crossref (21)
Scopus Clarivate Crossref
View Publication
Publication Date
Tue Nov 19 2024
Journal Name
Journal Of Baghdad College Of Dentistry
The effect of nutritional status on mesiodistal and bucco/ lingual or palatal diameters of permanent teeth among fifteen years old students

Background: Malnutrition during human growth affects the size of the tissues at different stages of life, body proportions, body chemistry, as well as quality and texture of tissues. Teeth are particularly sensitive to malnutrition. Malnutrition may affect odontometric measurement involving tooth size dimensions. The aim of this study was to estimate the effect of nutrition on teeth size dimension measurements among students aged 15 years old. Materials and methods: This study was conducted among malnourished group in comparison to well-nourished group matching with age and gender. The present study included 167 students aged 15 years (83 malnourished and 84 well-nourished). The assessment of nutritional status was done by using body mass

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue Nov 19 2024
Journal Name
Journal Of Baghdad College Of Dentistry
The Effect of Nutritional Status on Mesiodistal and Bucco-Lingual (Palatal) Diameters of Primary Teeth among Five Years Old Kindergarten Children

Background: Malnutrition in human life may adversely affect various aspects of growth at different stages of life. Teeth are particularly sensitive to malnutrition. Malnutrition may affect odontometric measurement involving tooth size dimensions. The aim of this study is to estimate the effect of nutrition on teeth size dimension measurements among children aged 5 years old. Materials and methods: This study was conducted among malnourished group in comparison to well-nourished group matching with age and gender. The present study included 158 children aged 5 years (78 malnourished and 80 well-nourished). The assessment of nutritional status was done by using three nutritional indicators, namely Height-for-age, Weight-for-age and Weight-fo

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sun Sep 03 2023
Journal Name
Wireless Personal Communications
Scopus Clarivate Crossref
View Publication
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (12)
Crossref (5)
Scopus Crossref