Abstract
The image of the soldier, as a hero who sacrifices everything to defend his
country and values, is no longer depicted in modern drama. With two World Wars
and many regional wars and civil wars, the soldier becomes a victim, not a hero.
Authors present the character of the soldier as a man who suffers a lot as he is
victimized by his own government and its politics that forces him to be in such a
position. Dramatists express their views about race, oppression and war through
their characters, such as the character of the soldier, as in the two selected plays for
this research: The Hostage by Brendan Behan and A Soldier's Play by Charles
Fuller.
The Hostage depicts, through its events, the Irish oppression which makes
both the Irish and the English victims for this conflict. A Soldier's Play presents the
oppression which the blacks face daily in their society, a matter which creates
among them the oppressed and the oppressor.
An oppressed people demand that all their resources be put to the
service of liberating them, no matter what these resources are. Certainly art and
culture must be seen in such a light. Literature, as part of art is sometimes the
mirror of its society and people. Dramatists, in general, and Brendan Behan and
Charles Fuller, in particular, are aware of the value of the theatre as a tool for social
discussion, therefore; their characters no more assume limited quality, as they
assume a universal one.1
Berndan Behan's The Hostage, which lies in three acts, was first
presented by Theatre Workshop in 1958. It takes place in an old house in Dublin. It
is owned by Monsewer, an Englishman by birth, who is more fanatically Irish than
his entourage; Pat, who served with Monsewer in the civil war, is no longer fanatic.
This study discusses the Critical Discourse Analysis of 2012 American Presidential Election Debate’. The researcher adopts a model proposed by Van Dijk’s (2006 d). Six ideological categories have been selected within the overall strategies of the ideological square are used. The categories are of three levels of discourse structure : (the meaning, the argumentation, and the rhetoric) .They have shown effective criteria for detecting the most disguised systems of racism and manipulation.
Based on the analysis, it can be concluded that the elite discourses of candidates contribute to the reproduction of domination, Orientalism, and Islamophobia. This can be appl
... Show MoreIn this work, a numerical study is performed to predict the solution of two – dimensional, steady and laminar mixed convection flow over a square cylinder placed symmetrically in a vertical parallel plate. A finite difference method is employed to solve the governing differential equations, continuity, momentum, and energy equation balances. The solution is obtained for stream function, vorticity and temperature as dependent variables by iterative technique known as successive over relaxation. The flow and temperature patterns are obtained for Reynolds number and Grashof number at (Re= -50,50,100,-100) (positive or negative value refers to aidding or opposing buoyancy , +1 assisting flow, -1 opposing flow) and (102 to 105) , respective
... Show MoreAbstract
The study aims to identify the reality of knowledge management in decision-making in academic departments from the point of view of faculty members at Blonde University. It also aims to propose mechanisms and suggestions to improve decision-making in the academic departments of the university in light of the management of knowledge. To achieve the objectives of the study, a descriptive method was used, in which a questionnaire consisted of (40) items administered to (137) participants of the faculty members. The results of the study indicated that the reality of the application of knowledge management in the decision-making process showed a high score mean. There are no statistically significant d
... Show MoreThis research was conducted to measure the safety of heat stable enterotoxin a (STa) produced by enterotoxigenic Escherichia coli, through studying its toxic effect on mice since it showed a promising effect in reducing the proliferation of colorectal cancer cells. The cytogenetic effect was determined after giving five different doses (100, 200, 400, 800 and 1600)μg/Kg in comparison with negative (phosphate buffer saline / PBS) and positive (mitomycin C/ MMC, at doses of 2 and 5μg/Kg) controls on mouse bone marrow cells by employing the following parameters: mitotic index, chromosomal aberrations and micronucleus, also, the serum level of liver functional enzymes (GOT, GPT, ALP) was recorded. In addition, lethal dose 50 (LD 50) with cert
... Show MoreRenal transplantation is a principal treatment option for end-stage kidney failure. Bone loss and fracture are serious complication of kidney transplantation, associated with morbidity and mortality. The pathogenesis of post transplantation bone loss is multifactorial and complex
The concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present s
... Show MoreProtecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa
... Show More