The present paper is a qualitative descriptive study. It aims to examine the macro-cultural schemata addressing the concept of violence against women in Iraq from a cognitive linguistic point of view. To meet this objective, a number of Iraqi social caricatures have been selected from two popular and active Iraqi caricaturists, Odeh Al-Fahdawi and Nasser Ibrahim. The selection and the analysis of data have been achieved following the validity and reliability procedures and the ethical considerations. To meet this objective, Sharifian’s Model (2011) of Cultural Schemata has been adopted in data analysis. The study has concluded that the macro-cultural schemata regarding the concept of violence in the selected panels reveals that violence against women does exist in the Iraqi society, and that woman and children are the major victims of that phenomenon. Moreover, the major cause of such a phenomenon is due to the patriarchal nature of the society that leads to have an unbalanced power between the two parties man vs. woman/children; in addition to other reasons related to the unfair social traditions and customs. The mismatch in power has been conceptualized creatively and differently by these two caricaturists. Speaking from the cognitive linguistic point of view, the researchers have also found that the panels are symbolic rather than iconic, as they involve culture-proper figures. Finally, both caricaturists invested the conceptual metaphors and figurative devices when depicting the concept of violence against women; that is, the concept of violence against women is universal in their panels; however, the way it is depicted is subjective and cultural-proper at the micro-cultural level.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe provision of safe water for people is a human right; historically, a major number of people depend on groundwater as a source of water for their needs, such as agricultural, industrial or human activities. Water resources have recently been affected by organic and/or inorganic contaminants as a result of population growth and increased anthropogenic activity, soil leaching and pollution. Water resource remediation has become a serious environmental concern, since it has a direct impact on many aspects of people’s lives. For decades, the pump-and-treat method has been considered the predominant treatment process for the remediation of contaminated groundwater with organic and inorganic contaminants. On the other side, this tech
... Show MoreThe drying process is considered an effective technique for preserving foods and agricultural products from spoilage. Moreover, the drying process lessens the products' weight, volume, and packaging, which prompts a reduction in the products' transportation costs. The drying technique with solar energy represents an ancient method, still alluring due to solar energy abundance and cost‐effectiveness. In this article, the previous manuscripts concerned with studying and analyzing indirect solar dryer systems that utilize innovative solar air heaters (SAHs) are reviewed. The results and conclusions are discussed intensively to clarify the significance of utilizing this type of drying technique. The ef
Trajectory tracking and vibration suppression are essential objectives in a flexible joint manipulator control. The flexible joint manipulator is an under-actuated system, in which the number of control actions is less than the degree of freedom to be controlled. It is very challenging to control the underactuated nonlinear system with two degree of freedom. This paper presents a hierarchical sliding mode control (HSMC) for a rotary flexible joint manipulator (RFJM). Firstly, the rotary flexible joint manipulator is modeled by two subsystems. Secondly, the sliding surfaces for both subsystems are constructed. Finally, the control action is designed based on the Lyapunov function. Computer simulation results demonstrate the effectiveness of
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreEarly detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med
... Show More