Preferred Language
Articles
/
jcoeduw-1131
The Female Characters In The Pre-Raphaelite Novel: M.E. Braddon’s Lady Audley’s Secret (An Extracted Research of Master Degree Letter)
...Show More Authors

Victorian age is known as a time of perpetual change. It is a time of new industrialization, increased urbanization and new technology. Therefore, one of the strongest undercurrents of this is the position of women. Woman at that time was viewed as “an angel in the house” especially this who belongs to the upper-middle class. She is described in such term because she spends much time in her domestic domain. Therefore, she should be passive, obedient and dependent. Despite the Victorian society contains several classes; women are defined under two labels: the angel and the demon or the whore. The angel woman can be any woman from the lower middle class to the aristocracy, while the whore refers to any working class woman. The difference between the two is that the second type has to work outside to earn the living. Living in a patriarchal society, both types of women are oppressed. The first type, the angel, should not have the right to be independent or even to make any choice and if she does, she will be mad, dangerous and demon, while the second type is considered rebellious and whore for being seen among the outsiders. Thus and as result, both of them are mistreated as outcasts. The Pre-Raphaelite writers are daring and so interested in the issue of woman because of the reasons mentioned above. One of them is Mary Elizabeth Braddon. In her novel, Lady Audley’s Secret, she tries to show the position of women and the Victorian attitudes towards them through the symbol of the characters especially the female characters. There are no much details about them in the novel because they are used as symbol to bring the attention of the readers to social and moral problems concerning the Age. This can be clearly seen in the character of Lady Audley. She stands for the threatening woman who tries to make a change in a patriarchal world. The female characters in the novel represent the fear of women’s independence. Lady Audley is considered a devilish and dangerous woman and should be buried alive in an asylum because she violates the prevailing traditions. She portrays the fears of many people in the patriarchal society including even the women as Alicia, Phoebe, and Clara. Lady Audley shows that even those women, who are obedient, are oppressed by the severe society. They are the victims of the filial and marital power. 

Concerning classes, Lady Audley shows that it is a crime for the lower class to intrude high class. They are considered criminal and deserve punishment while the high class has the authority to do anything. Because Lady Audly intrudes the upper class by marrying Sir Michael, she is considered a criminal. Lady Audly is not a mere character. She is a new heroine and representative because she stands for all female characters who try to make changes in a patriarchalworld.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 13 2020
Journal Name
International Journal Of Productivity And Performance Management
An examination of talent management processes in Australian higher education
...Show More Authors
Purpose

The purpose of this paper is to understand the best processes that are currently used in managing talent in Australian higher education (HE) and to examine the policies in terms of talent management processes (TMPs) that are derived from objective one. Pragmatic benefits for academic institutions focused on enhancing talent.

Design/methodology/approach

This study selects the mixed method as its research design. In the qualitative study, there were three methods: brainstorming, focus group and individual interviews, followed by the quantitative questionnaire

... Show More
View Publication
Scopus (22)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Thu Aug 17 2023
Journal Name
Journal Of Thermoplastic Composite Materials
Fabrication and characterization of PEKK nanocomposites: An in vitro study
...Show More Authors

Although the number of implants has increased gradually and consistently over the years to around one million per year globally, there is still far more potential for advancement in the field of dental implantology which is typically growing quickly. This study investigates the effect of nanofiller reinforcement high-performance polymer matrix to enhance mechanical and physical characteristics. Calcium silicate (CS)/Polyetherketoneketone (PEKK) biomedical composite (G0 as a control group) is reinforced with different weight percentages (G1-G4) of tellurium dioxide nanoparticles (TeO2NPs) ( n = 5). This research uses ethanol as a binder for mixing various weight percentages (wt%) of TeO2NPs w

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Samarra Journal Of Pure And Applied Science
Preclinical Oral Histology Research: A Retrospective Review Study
...Show More Authors

A retrospective study is conducted to identify factors that improve prospective animal studies; contribute to the optimization of animal protection from all unnecessary and preventable damage. Preclinical oral histology research from 2010-2020 is evaluated and 64 studies were reviewed relating to two interventions: bone trauma and surgical incision. The harm-benefit analysis is featured in this study through the application of the recent form of Bateson's Cube. Depending on its three axes, we can assess animal suffering, the likelihood of benefit, and the importance of research. The total number of animals used in the research is 2685. Rats, 51.6%, and rabbits, 48.4%, are the most commonly used animals. Research related to bone healing acco

... Show More
Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Traitement Du Signal
Optimizing Acoustic Feature Selection for Estimating Speaker Traits: A Novel Threshold-Based Approach
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (19)
Crossref (15)
Scopus Clarivate Crossref