This paper deals with the ideological positioning of the English poet John Donne in a selected poems of his i.e Holy Sonnet X, as regards the theme of death found therein. The researchers adopt an emerging branch of stylistics, called Critical Stylistics, as proposed by Jeffries (2010) in order to uncover the ideologies of the author regarding the topic concerned and how linguistic choices are used to slant ideas. The model is comprised of ten tools of analysis which, upon being applied to the selected data, have shown how the poet exploits language resources in order to pass his ideology and influence his readers. In this paper, the workings of only one tool are presented as applied to a certain portion of the data.
Organizations adopt a number of procedures and instructions in their field of activities in order to aid their resources development and energies to serve their entrepreneurial orientations. This calls for preparing a range of mechanisms to mitigate the strictness and complexity of procedures. The ambiguity and severe complexity of procedures means acknowledging the loss in energy and this in turn impedes the hopes while in the same time weakens the enthusiasm in these organizations and an impedes the possibility to achieve continues innovation, thereby losing opportunities to the level of surrender to the risks and assuming them to be unconquered obstacles.
There
... Show MoreThe objectives of this study revolve around identifying the extent of funding impact on the future of the printed Iraqi press, and whether it threatens their chances of survival, stating the extent of technological development on the income of the printed newspaper, and identifying the causes of the financial crisis on the newspaper. This research is classified as descriptive research, and the researcher used the survey method, and adopted the questionnaire of the views of the contactors, in five Iraqi newspapers (morning - extent - time - the way of the people - the call). The research community included (68) respondents, whereby the comprehensive inventory method was used to define the research community, and the researcher used t
... Show MoreThe objectives of this study revolve around identifying the extent of funding impact on the future of the printed Iraqi press, and whether it threatens their chances of survival, stating the extent of technological development on the income of the printed newspaper, and identifying the causes of the financial crisis on the newspaper.
This research is classified as descriptive research, and the researcher used the survey method, and adopted the questionnaire of the views of the contactors, in five Iraqi newspapers (morning - extent - time - the way of the people - the call).
The research community included (68) respondents, whereby the comprehensive inventory method was used to define the research community, and the researcher used
Explainable Artificial Intelligence (XAI) techniques enable transparency and trust in automated visual inspection systems by making black-box machine learning models understandable. While XAI has been widely applied, prior reviews have not addressed the specific demands of industrial and medical inspection tasks. This paper reviews studies applying XAI techniques to visual inspection across industrial and medical domains. A systematic search was conducted in IEEE Xplore, Scopus, PubMed, arXiv, and Web of Science for studies published between 2014 and 2025, with inclusion criteria requiring the application of XAI in inspection tasks using public or domain-specific datasets. From an initial pool of studies, 75 were included and categorized in
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e
... Show MoreSalicylaldehyde was reacting with 2-amino benzoic acid to produce the Schiff base ligand benzoic acid 2-salicylidene (L). The prepared ligand was identified by Microelemental Analysis, FT.IR and UV-Vis spectroscopic techniques. A new complexes of Co(II),Ni(II),Cu(II) and Zn(II) with Schiff base was prepared in aqueous ethanol with a (1:1) M:L. The prepared complexes were characterized using flame atomic absorption, (C.H.N) Analysis, FT.IR and UV-Vis spectroscopic methods as well as magnetic susceptibility and conductivity measurements. Biological activity of the ligand and complexes against three selected types of bacteria were also examined. Some of the complexes exhibit good bacterial activities. From the obtained data the tetrahedral str
... Show MoreSome of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreSewer system plays an essential task in urban cities by protecting public health and the environment. The operation, maintenance, and rehabilitation of this network have to be sustainable and scientifically. For this purpose, it is crucial to support operators, decision makers and municipalities with performance evaluation procedure that is based on operational factors. In this paper, serviceability and performance indicator (PI) principles are employed to propose methodology comprising two enhanced PI curves that can be used to evaluate the individual sewers depending on operational factors such as flowing velocity and wastewater level in the sewers. To test this methodology; a case study of al-Rusafa in Baghdad city is
... Show MoreSewer system plays an indispensable task in urban cities by protecting public health and the environment. The operation, maintenance, and rehabilitation of this network have to be in a sustainable and scientific manner. For this purpose, it is important to support operators, decision makers and municipalities with performance evaluation procedure that is based on operational factors. In this paper, serviceability and performance indicator (PI) principles are employed to propose methodology comprising two enhanced PI curves that can be used to evaluate the individual sewers depending on operational factors such as flowing velocity and wastewater level in the sewers. In order to test this methodology; a case study of al-Ru
... Show More