Language is a vehicle for social values and ideologies that a man intends or attempts to express. Dramatic texts are one of the discursive practices that embody values and ideologies. What is expressed in dramatic text is deliberate because it is meant to affect other’s values, trends and ideologies in one way or another. Such ideologies and values are not explicit. To bring them out requires putting language under scrutiny to unveil what is implied. The present study attempts to analyze a dramatic script entitled Advice to Iraqi Women by the British playwright Martin Crimp in an attempt to unveil the intended political ideologies underlying the text. The title reflects a political aspect embedded in the word “Iraqi” that brings to the mind the war broken out there at that time. Notwithstanding that the script is written in such an unusual manner that appears to the reader or the spectator to be domestic, familiar and free from any political indications. The model adopted in the analysis of Crimp’s theatrical piece is that of van Dijk’s macro and microstructure analysis within critical discourse analysis. Results have manifested the political ideologies that the writer intends to convey. He attempted to bridge a gap and render the English society to be associated emotionally with the repercussions of the remote war by amalgamating what is familiar with what is unfamiliar.
The quantum chromodynamics theory approach was taken to study the photonic emission from interaction of quark gluon at high at Bremsstrahlung processes. Strength coupling, quark charge 𝑒𝑞 , flavor number 𝑛𝐹 , thermal energy T of system, fugacity of gluon ƛ𝑔, fugacity of quark ƛ𝑞 , critical temperature 𝑇𝐶 and photons energy 𝐸 are taken to calculate photons rate via the quantum system. Photons emission rate studies and calculates via high energy 400MeV to 650 MeV using flavor number 3 and 7 for 𝑢̅𝑔 → 𝑑̅𝑔𝛾 and 𝑐𝑔 → 𝑠𝑔𝛾 systems at bremsstrahlung processes with critical temperature (𝑇𝑐 = 190 and 196) MeV with photons energy (1-10) GeV. The confinement and de-confineme
... Show MoreOne of the important differences between multiwavelets and scalar wavelets is that each channel in the filter bank has a vector-valued input and a vector-valued output. A scalar-valued input signal must somehow be converted into a suitable vector-valued signal. This conversion is called preprocessing. Preprocessing is a mapping process which is done by a prefilter. A postfilter just does the opposite.
The most obvious way to get two input rows from a given signal is to repeat the signal. Two rows go into the multifilter bank. This procedure is called “Repeated Row” which introduces oversampling of the data by a factor of 2.
For data compression, where one is trying to find compact transform representations for a
... Show MoreThe study aims at diagnosing the importance of environmental analysis (external, industrial and internal) in the organization's strategy for the development of public organizations. The theoretical problem derived from the existence of a knowledge gap for studies and research that dealt with the variables of the study. Three public organizations were selected as the study society (the Civil Defense Directorate, the Directorate of Nationality, Passports and Residency, the General Traffic Directorate). The sample of the study was a sample of (215) managers (managers, department managers, Analysis of the data and hypothesis testing using the appropriate statistical tools, Pearson, the simple and multiple regression coefficient to te
... Show MoreThis is an empirical investigation of the tribal power in Iraq and its consequences on the socio-political system. A theoretical background concerning thestate kinship, tribe and tribal involvement in politics has been displayed with example of tribal power over people within the social context. Socio-anthropological method of data collection has been used, including a semi-structured interview with a sample of 120 correspondents. The outcome revealed that the feeble and corrupted state (government) play a vital role in encouraging the tribe to be dominant. The people of Iraq are clinging to the tribe regardless of whether they believe in it or not. Although they are aware that the tribe is a pre-state organisation and marred shape of ci
... Show MoreFour different spectrophotometric methods are used in this study for the determination of Sulfamethoxazole and sulfanilamide drugs in pharmaceutical compounds, synthetic samples, and in their pure forms. The work comprises four chapters which are shown in the following: Chapter One: Includes a brief for Ultraviolet-Visible (UV-VIS) Absorption spectroscopy, antibacterial drugs and sulfonamides with some methods for their determination. The chapter lists two methods for optimization; univariate method and multivariate method. The later includes different types, two of these were mentioned; simplex method and design of experiment method. Chapter Two: Includes reaction of the two studied drugs with sodium nitrite and hydrochloric acid for diazo
... Show MoreThe current study aims to identify the needs in the stories of the Brothers Grimm. The research sample consisted of (3) stories, namely: 1- The story of the Thorn Rose (Sleeping Beauty) 2- The story of Snow White 3- The story of Little Red Riding Hood. The number of pages analyzed reached (15.5) pages, and to achieve the research objectives, Murray's classification of needs was adopted, which contains (36) basic needs that are further divided into (129) sub-needs. The idea was adopted as a unit of analysis and repetition as a unit of enumeration, Reliability was extracted in two ways: 1- Agreement between the researcher and himself over time, where the agreement coefficient reached 97%. The second was agreement between the researcher and tw
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreThe current research aims to analyze the chemistry books for the preparatory stage according to life skills for the academic year (2019-2020) and to know the life skills contained in the chemistry books for the preparatory stage through the following two questions:1-What life skills should be available in the content of chemistry books prescribed for middle school students approved by the Ministry of Education, General Directorate of Curricula in the academic year(2019-2020). 2-What is the percentage of life skills included in the content of chemistry textbooks prescribed for middle school students approved by the Ministry of Education, General Directorate of Curricula in the academic year (2019-2020). To achieve the objectives of the resea
... Show More