Preferred Language
Articles
/
jcoeduw-1618
Adapting the Grimms: Going Against Patriarchy in Singh’s Movie Mirror Mirror
...Show More Authors

Many cinematic adaptations were produced for the Grimms’ “Little Snow-White” (1812) including Mirror Mirror movie (2012), the contemporary version adapted by Taresm Singh. Singh’s version was able to depict the modern reality of women and went against patriarchy by embracing feminist ideologies of the fourth-wave feminism. Therefore, he challenged the ideologies of the mainstream cinema dominated by the patriarchal élite’s capitalist mode of production that still adhere to the stereotyped patriarchal image of women’s ‘victimization,’ ‘objectification’ and ‘marginalization,’ which did not represent women’s modern reality anymore. This paper, however, is a qualitative study aimed to prove that the feminist ideologies could only be retained after a cultural transformation process from the patriarchal élite culture to the popular culture of mass media after the World War II, which noticeably affected women’s image in the cinema. And thus, this paper is an analytical study of Mirror Mirror that used the analytical textual and production approaches to popular culture along with the Marxist and feminist film theories to unfold the feminist ideologies prevailed in the movie. The study has concluded that the cultural transformation from the patriarchy into the popular culture of mass media led to the emergence of counter-cinema or cinefeminism that encouraged the reversing of the traditional gender roles in cinema. It has also shown that class conflict and economic power caused by the cultural transformation helped in redefining women’s role and place in society. Thereby maintaining the feminist ideologies of the fourth-wave’s ‘women’s empowerment’ positively affected women and girls to reflect their modern reality

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 15 2022
Journal Name
Alustath Journal For Human And Social Sciences
کاریگەری ستراتیجیەتی مێزگرد لەسەر دەستکەوتی بابەتی خوێندنەوە و ئەدەبی کوردی
...Show More Authors

Preview PDF
Publication Date
Wed Jan 02 2013
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Heparin versus enoxaparine for prevention of asymptomatic deep venous thrombosis after total knee arthroplasty
...Show More Authors

Background: Venous thromboembolic disease (VTED) is a well known complication that occur following total knee arthroplasty (T.K.A). One of the (VTED) forms is asymptomatic deep venous thrombosis with an incidence has been estimated to be up to ³ 20% in patients undergone primary T.K.A , despite routine treatment with heparin postoperatively.

Objectives : is to assess the prevalence of post-operative asymptomatic D.V.T among patients receiving two different thromboprophylactic drugs after T.K.A.

Patients and methods: 68 patients who had T.K.A were randomly divided for the purpose of post-operative thromboprophylaxis into two groups , group [ A ] (control group) consisted

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
دراسة حالة: Case Study
...Show More Authors

The purpose of this research is to demonstrate the impact of deposit insurance to reduce banking risks, as banks in various countries of the world face a variety of risks that led to banking and financial crises that led to the failure and bankruptcy of many of its bank, which led to the banks to find quick and appropriate solutions to get rid of these difficulties These solutions include the use of bank deposit protection system for the many risks and sequences of crises that accompanied the Iraqi banking work of thefts, forgery, embezzlement and changing and unstable circumstances. The importance of studying the subject of research through the theoretical framework of banking risks as well as the framework of consideration In order to

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Prioritized Text Detergent: Comparing Two Judgment Scales of Analytic Hierarchy Process on Prioritizing Pre-Processing Techniques on Social Media Sentiment Analysis
...Show More Authors

Most companies use social media data for business. Sentiment analysis automatically gathers analyses and summarizes this type of data. Managing unstructured social media data is difficult. Noisy data is a challenge to sentiment analysis. Since over 50% of the sentiment analysis process is data pre-processing, processing big social media data is challenging too. If pre-processing is carried out correctly, data accuracy may improve. Also, sentiment analysis workflow is highly dependent. Because no pre-processing technique works well in all situations or with all data sources, choosing the most important ones is crucial. Prioritization is an excellent technique for choosing the most important ones. As one of many Multi-Criteria Decision Mak

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Jan 03 2016
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Chromogranin A: As A Tumor Marker for Neuroendocrine Tumors Diagnosis, Follow-up & Its Correlation with Response to Somatostatin Analogues
...Show More Authors

Background: Chromogranin A is a useful tumor marker for neuroendocrine tumors (NETs) diagnosis & follow-up, Octreotide (somatostatin-long acting repeatable (SAS-LAR)) is an established treatment for NETs. Studies regarding the relation between response to SAS-LAR & the change in Chromogranin A (CgA) plasma level are still lacking.
Objectives: To determine the association between the using of Octreotide (SAS-LAR) and CgA level on time sequence & clinical status.
Patients & methods: a prospective observational study included 38 neuroendocrine patients in The Oncology Teaching Hospital/medical city complex/Baghdad, started at September 2013 till May 2016; assessing their circulating chromogranin A (CgA) plasma levels o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 02 2009
Journal Name
Journal Of Educational And Psychological Researches
الإدراك الحسي الحركي لدى الطلبة المتفوقين والمتأخرين دراسيا في المدارس الإعدادية (بحث مستل من رسالة ماجستير بنفس العنوان / جامعة بغداد) كلية التربية للبنات 2009 م
...Show More Authors

مشكلة البحث   The Problem of the Research

 

          يعّد التحصيل الدراسي للطلبة عموما من أهم أركان النشاط العقلي في المجال التربوي، فلا تكاد تخلو منه أيه مدرسة، أبتداءً من المدارس الابتدائية وقد تسبقها رياض الأطفال، إلى المدرسة الإعدادية والجامعية ، وقد تمتد إلى مراحل متقدمة في العمر، فكان الطالب وما يزال هو محور العملية ال

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Adaptive Satellite Image Classification Technique for Al habbinya Region West of Iraq
...Show More Authors

   Developing a new adaptive satellite images classification technique, based on a new way of merging between regression line of best fit and new empirical conditions methods. They are supervised methods to recognize different land cover types on Al habbinya region. These methods should be stand on physical ground that represents the reflection of land surface features.      The first method has separated the arid lands and plants. Empirical thresholds of different TM combination bands; TM3, TM4, and TM5 were studied in the second method, to detect and separate water regions (shallow, bottomless, and very bottomless). The Optimum Index Factor (OIF) is computed for these combination bands, which realized

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 31 2011
Journal Name
Al-khwarizmi Engineering Journal
Path Planning Control for Mobile Robot
...Show More Authors

Autonomous motion planning is important area of robotics research. This type of planning relieves human operator from tedious job of motion planning. This reduces the possibility of human error and increase efficiency of whole process.

This research presents a new algorithm to plan path for autonomous mobile robot based on image processing techniques by using wireless camera that provides the desired image for the unknown environment . The proposed algorithm is applied on this image to obtain a optimal path for the robot. It is based on the observation and analysis of the obstacles that lying in the straight path between the start and the goal point by detecting these obstacles, analyzing and studying their shapes, positions and

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 30 2023
Journal Name
Iraqi Journal Of Science
Color Image Steganography Using Gradient Selective Bezier Curves
...Show More Authors

     Internet technology has revolutionized the landscape of communication technologies in the modern era. However, because the internet is open to the public, communication security cannot be guaranteed. As a result, data concealment approaches have been developed to ensure confidential information sharing. Various methods have emerged to achieve the goal of secure data communication via multimedia documents. This study proposes a method, which is both adaptable and imperceptible, for concealing a secret text in a color image. From an adaptivity perspective, image corners are detected using the Harris corner detection algorithm and utilized as anchor points for picking the optimal hiding regions of interest using Bezier curve interp

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Modify Symmetric Block Cipher Algorithm Using Generated Digital 3D Fractal Image
...Show More Authors

The principal goal guiding any designed encryption algorithm must be security against unauthorized attackers. Within the last decade, there has been a vast increase in the communication of digital computer data in both the private and public sectors. Much of this information has a significant value; therefore it does require the protection by design strength algorithm to cipher it. This algorithm defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The Performance and security level is the main characteristics that differentiate one encryption algorithm from another. In this paper suggested a new technique to enhance the performance of the Data E

... Show More
View Publication Preview PDF