Many literary research papers have dealt with the work of Margaret Atwood's The Handmaid's Tale (1985) as a feminist work. However, nearly few studies combine social oppression with religious extremism. To bridge this gap, the present study aims at exploring the use of totalitarian theocracy of terror to oppress its citizens in the name of religion. In other words, it explicates the way religion is used to brutally suppress and exploit people in general and vulnerable women in particular. To meet this objective, the study adopted the qualitative descriptive method to describe how religion is used as a contradictory controlling means in Gilead discourse. It also adopted the Foucault theory in analyzing the data of the study, illustrating the means of terror in the novel, and identifying the features of the Gileadean regime. The study has concluded that the plight of women does not happen in a vacuum. It is a result and a reflection of people's past and present times. It is the extremist religious discourse that almost always contributes to violence and oppression. Finally, the Republic of Gilead highlights a common point between the dark and modern ages where the female citizens lived under the oppressive patriarchal government.
The research aims to explain the role of huge data analyzes in measuring quality costs in the Iraqi company for the production of seed, and the research problem was diagnosed with the weakness of the approved method to measure quality costs, and the weak traditional systems of data analyzes, the researcher in the theoretical aspect relied on collecting sources and previous studies, as well as Adoption of the applied analytical approach in the practical aspect, as a set of financial analyzes were applied within the measurement of quality costs and a statement of the role of data analyzes in the practical side, the research concluded to a set of conc
... Show MoreA spectrophotometric- reverse flow injection analysis (rFIA) method has been proposed for the determination of Nitrazepam (NIT) in pure and pharmaceutical preparations. The method is based upon the coupling reaction of NIT with a new reagent O-Coumaric acid (OCA) in the presence of sodium periodate in an aqueous solution. The blue color product was measured at 632 nm. The variation (chemical and physical parameters) related with reverse flow system were estimated. The linearity was over the range 15 - 450 µg/mL of NIT with detection limits and limit of quantification of 3.425 and 11.417 µg mL-1 NIT,respectively. The sample throughput of 28 samples
... Show MoreAutorías: Nuha Mohsin Dhahi, Ahmed Thare Hani, Muwafaq Obayes Khudhair. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 6, 2022. Artículo de Revista en Dialnet.
The research is based on a statement of the effect and nature of the relationship of elements of promotional mix represented by (advertising, personal selling, sales promotion, public relations and direct marketing) as the independent variable in the dependent variable represented in the competitive advantage in the General Company for the manufacture of medicines and medical supplies Samarra. Analytical descriptive in the theoretical side, through the use of a number of literature from scientific sources (books, research and studies published in Arab and foreign magazines) was also relied on the methodology of the case study in the practical side, Data collection using the questionnaire tool, which was designed using the triangular Like
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreThis work is aiming to study and compare the removal of lead (II) from simulated wastewater by activated carbon and bentonite as adsorbents with particle size of 0.32-0.5 mm. A mathematical model was applied to describe the mass transfer kinetic.
The batch experiments were carried out to determine the adsorption isotherm constants for each adsorbent, and five isotherm models were tested to choose the best fit model for the experimental data. The pore, surface diffusion coefficients and mass transfer coefficient were found by fitting the experimental data to a theoretical model. Partial differential equations were used to describe the adsorption in the bulk and solid phases. These equations were simplified and the
... Show MoreElectro-kinetic remediation technology is one of the developing technologies that offer great promise for the cleanup of soils contaminated with heavy metals. A numerical model was formulated to simulate copper (Cu) transport under an electric field using one-dimensional diffusion-advection equations describing the contaminant transport driven by chemical and electrical gradients in soil during the electro-kinetic remediation as a function of time and space. This model included complex physicochemical factors affecting the transport phenomena, such as soil pH value, aqueous phase reaction, adsorption, and precipitation. One-dimensional finitedifference computer program successfully predicted meaningful values for soil pH profiles and Cu
... Show More