Sam Shepard is considered as one of the modern American playwrights who combined the individual and the social in his plays to draw an image of a postmodern American society, and American family in particular by focusing on uniquely American aspects of culture. He is concerned with the individual in America rather than the institution. Shepard investigates, in almost all of his plays, the functions and dysfunctions of his characters, as well as the connections of individuals within the context of the family system and other social structures. The majority of his plays center on the struggle and conflict that occurs between father and son, husband and wife, and brother and brother as they strive for supremacy or for survival in a fractured society. This theme can be found at the heart of all of his works. In addition, his protagonists have a propensity to be cut off from the rest of their society and to experience a sense of disintegration as a result of living in a society that is being ravaged by war and the rise of capitalism. His protagonists typically awaken to the realization that this sense of destruction has shaped their lives and become the primary obstacle that prevents them from leading a normal life. This paper discusses Sam Shepard’s play States of Shock as an anti-war work in which the playwright portrays American individuals who are traumatized, physically and psychologically, by war that left them fragmented in their own society.
A condense study was done to compare between the ordinary estimators. In particular the maximum likelihood estimator and the robust estimator, to estimate the parameters of the mixed model of order one, namely ARMA(1,1) model.
Simulation study was done for a varieties the model. using: small, moderate and large sample sizes, were some new results were obtained. MAPE was used as a statistical criterion for comparison.
paper
The research aims to identify the risks faced by projects and work on the administration, such as those risks by using professional Project Management System (Project Management Professional) by identifying those risks and their impact on the objectives of the project, if they occur and to provide appropriate responses to Ha.autam search application on the draft Law Faculty port by the General Mansour Construction Contracting company has been using a method personal interview with the heads of departments and project managers in the Al-Mansour and tools descriptive and quantitative analysis as was used (likelihood and impact of risk analysis, Ai_kaoa scheme Sbb- effect, analysis of probability and impact, risk matrix (probability
... Show MoreFlexible molecular docking is a computational method of structure-based drug design to evaluate binding interactions between receptor and ligand and identify the ligand conformation within the receptor pocket. Currently, various molecular docking programs are extensively applied; therefore, realizing accuracy and performance of the various docking programs could have a significant value. In this comparative study, the performance and accuracy of three widely used non-commercial docking software (AutoDock Vina, 1-Click Docking, and UCSF DOCK) was evaluated through investigations of the predicted binding affinity and binding conformation of the same set of small molecules (HIV-1 protease inhibitors) and a protein target HIV-1 protease enzy
... Show MoreThirteen morphometric characters of catfish
This work is concerned with designing two types of controllers, a PID and a Fuzzy PID, to be used
for flying and stabilizing a quadcopter. The designed controllers have been tuned, tested, and
compared using two performance indices which are the Integral Square Error (ISE) and the Integral
Absolute Error (IAE), and also some response characteristics like the rise time, overshoot, settling
time, and the steady state error. To try and test the controllers, a quadcopter mathematical model has
been developed. The model concentrated on the rotational dynamics of the quadcopter, i.e. the roll,
pitch, and yaw variables. The work has been simulated with “MATLAB”. To make testing the
simulated model and the controllers m
Water stress has a negative impact on the yield and growth of crops worldwide and consequently has a global impact on food security. Many biochemical changes occur in plants as a response to water stress, such as activation of antioxidant systems. Molybdenum (Mo) plays an important part in activating the expression of many enzymes, such as CAT, POD, and SOD, as well as increasing the proline content. Mo therefore supports the defence system in plants and plays an important role in the defence system of mung bean plants growing under water stress conditions. Four concentrations of Mo (0, 15, 30, and 45 mg·L−1) were applied to plants, using two approaches: (a) seed soaking and (b) foliar application. Mung bean plants were subject
... Show MoreWe aimed to obtain magnesium/iron (Mg/Fe)-layered double hydroxides (LDHs) nanoparticles-immobilized on waste foundry sand-a byproduct of the metal casting industry. XRD and FT-IR tests were applied to characterize the prepared sorbent. The results revealed that a new peak reflected LDHs nanoparticles. In addition, SEM-EDS mapping confirmed that the coating process was appropriate. Sorption tests for the interaction of this sorbent with an aqueous solution contaminated with Congo red dye revealed the efficacy of this material where the maximum adsorption capacity reached approximately 9127.08 mg/g. The pseudo-first-order and pseudo-second-order kinetic models helped to describe the sorption measure
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More