Preferred Language
Articles
/
jcoeduw-1586
A Dystopian Future: Social Oppression and Religious Extremism in Margaret Atwood's The Handmaid's Tale
...Show More Authors

Many literary research papers have dealt with the work of Margaret Atwood's The Handmaid's Tale (1985) as a feminist work. However, nearly few studies combine social oppression with religious extremism. To bridge this gap, the present study aims at exploring the use of totalitarian theocracy of terror to oppress its citizens in the name of religion. In other words, it explicates the way religion is used to brutally suppress and exploit people in general and vulnerable women in particular. To meet this objective, the study adopted the qualitative descriptive method to describe how religion is used as a contradictory controlling means in Gilead discourse. It also adopted the Foucault theory in analyzing the data of the study, illustrating the means of terror in the novel, and identifying the features of the Gileadean regime. The study has concluded that the plight of women does not happen in a vacuum. It is a result and a reflection of people's past and present times. It is the extremist religious discourse that almost always contributes to violence and oppression. Finally, the Republic of Gilead highlights a common point between the dark and modern ages where the female citizens lived under the oppressive patriarchal government.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Relationship's Impact Between the External and Internal Auditor in Preventing the Administrative & Financial Corruption: Applied Research in Sample Entities
...Show More Authors

    This research discusses one of the most important means of reducing corruption in public sector companies and government departments, a relationship of cooperation and coordination between the external auditor and internal auditor, in the light of ISA (610), the recommendations of the International Organization of Supreme Audit Institutions (INTOSAI) and the National Strategy to combat corruption. The research was based on two assumptions: the first was weak relationship of cooperation and coordination between the external auditor and internal auditor leads to weakne

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Algebra Letters
THE GRAPH OF A COMMUTATIVE KU-ALGEBRA
...Show More Authors

In This paper, we introduce the associated graphs of commutative KU-algebra. Firstly, we define the KU-graph which is determined by all the elements of commutative KU-algebra as vertices. Secondly, the graph of equivalence classes of commutative KU-algebra is studied and several examples are presented. Also, by using the definition of graph folding, we prove that the graph of equivalence classes and the graph folding of commutative KU-algebra are the same, where the graph is complete bipartite graph.

Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
The Decisive Answers: A Pragmatic Linguistic Study
...Show More Authors

The current research is concerned with studying the decisive answers which are considered quick and conclusive. These answers can effectively interrupt the opponent's argument and close the dialogue.This research is concentrated on deliberative methodology focusing on the decisive answer's activity and ending them through several completing and argument sides. This research consists of an introduction and three parts, the current introduction is focused the light on the concept of decisive answers and its uses in literature and the scarce of speech, and how to consider it with one dialogue description,that dialogue constitute by ? The first part is concerned with those answers through the deliberative methodology and classifying decisive

... Show More
View Publication Preview PDF
Publication Date
Mon May 11 2020
Journal Name
Journal Of Arts, Literature, Humanities And Social Sciences
The Kite Runner; A Journey of Growth
...Show More Authors

View Publication
Crossref
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
A Metaheuristic Approach to the C1S Problem
...Show More Authors

Given a binary matrix, finding the maximum set of columns such that the resulting submatrix has the Consecutive Ones Property (C1P) is called the Consecutive Ones Submatrix (C1S) problem. There are solution approaches for it, but there is also a room for improvement. Moreover, most of the studies of the problem use exact solution methods. We propose an evolutionary approach to solve the problem. We also suggest a related problem to C1S, which is the Consecutive Blocks Minimization (CBM). The algorithm is then performed on real-world and randomly generated matrices of the set covering type.  

View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 28 2019
Journal Name
Journal Of The College Of Education For Women
Relation Ship and Effect Of Jet Stream in Anti-Ciyclone in Influencing The Climate Of Iraq
...Show More Authors

This study aimed to statement jet stream and its impact in the anti-cyclone affecting the climate of Iraq. Through the use of simple correlation coefficient ( Pearson ) that there is a very strong relationship between high- Siberian and both of the jet stream especially during the winter or over the stations of North . Therefore we, observe the relationship be significant in most of the winter months , spring and autumn . Statistically significant , but are different between station and another station , while the study come to another Anti-ciyclon have a real ,significant and statistically relationship corrclation . But this relationship is less than which found in are much less it with the Siberian high , it depends on the type of stat

... Show More
View Publication Preview PDF
Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Modeling and Simulation of Copper Removal from the Contaminated Soil by a Combination of Adsorption and Electro-kinetic Remediation
...Show More Authors

Electro-kinetic remediation technology is one of the developing technologies that offer great promise for the cleanup of soils contaminated with heavy metals. A numerical model was formulated to simulate copper (Cu) transport under an electric field using one-dimensional diffusion-advection equations describing the contaminant transport driven by chemical and electrical gradients in soil during the electro-kinetic remediation as a function of time and space. This model included complex physicochemical factors affecting the transport phenomena, such as soil pH value, aqueous phase reaction, adsorption, and precipitation. One-dimensional finitedifference computer program successfully predicted meaningful values for soil pH profiles and Cu

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Mar 03 2020
Journal Name
International Journal Of Psychosocial Rehabilitation
A Study of Some Biochemical Variables and Functional Indicators and Their Relationship to the Achievement of 200m Young Runners
...Show More Authors

ES Hussein

View Publication
Publication Date
Thu Sep 28 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique
...Show More Authors

Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty

... Show More
View Publication
Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Computers & Mathematics With Applications
Analytical and numerical solutions for the nonlinear Burgers and advection–diffusion equations by using a semi-analytical iterative method
...Show More Authors

View Publication
Crossref (20)
Crossref