The present study is concerned with the writer's ideologies towards violence against women. The study focuses on analyzing violence against women in English novel to see the extent the writers are being affected and influenced by their genders. It also focuses on showing to what extent the writer's ideologies are reflected in their works. Gender influences social groups ideologies; therefore, when a writer discusses an issue that concerns the other gender, they will be either subjective or objective depending on the degree of influence, i.e., gender has influenced their thoughts as well as behaviors. A single fact may be presented differently by different writers depending on the range of affectedness by ideologies. The study aims to uncover the hidden gender-based ideologies by analyzing the discursive structure of a novel based on Van Dijk's model (2000) of ideology and racism. The selected novel is based on discussing violence against women. The study will later on reveal the real writer’s gender-based ideologies and whether the writer is a feminist or an anti-feminist? Or Is he prejudiced? Or Is he biased?
Phenol condensed with β-keto esters via Pechmann condensation to form derivatives of Coumarin in various reaction conditions by two ways. Present paper is comparative study of synthesis Coumarin with the yield of product , reaction time and reaction conditions.
Abstract: In this research, nanofibers have been prepared by using an electrospinning method. Three types of polymer (PVA, VC, PMMA) have been used with different concentration. The applied voltage and the gap length were changed. It was observed that VC is the best polymer than the other types of polymers.
Purpose/objective:
1 - To explain the financial impact of the activities and areas of human resources management and the adoption of the methodology for estimating costs on the basis of conduct and statement of how to assess costs and benefits of human resource activities.
2 - Measuring human capital, and its impact on the financial statements.
Design/methodology/approach:
Concentrated dimensions of the research paper's lack of financial statements prepared by the organizations for information mandated human resource its components of the three (attraction - development
... Show MoreThe antimicrobial activity of two naphthoquinone semicarbazone derivatives (Two newly synthesized compounds) have been studied by using tube — diluation and disc plate technique. The effect of those derivatives upon pathogenic microorganism iso-lated from specimen(urine iwounds,stool, swabs, throat ....etc) have been studied also in comparison with the antibiotics (amikacin,ampicillin, carbencillin, cephalothin, cefoxitin,clindamycin ,erythromycin,gentamycin,penicillin,tetracylin and tri-methoprim. It was shown that derivative(1) had more effective against micro organ-ism than derivative(11).
In this paper we present the theoretical foundation of forward error analysis of numerical algorithms under;• Approximations in "built-in" functions.• Rounding errors in arithmetic floating-point operations.• Perturbations of data.The error analysis is based on linearization method. The fundamental tools of the forward error analysis are system of linear absolute and relative a prior and a posteriori error equations and associated condition numbers constituting optimal of possible cumulative round – off errors. The condition numbers enable simple general, quantitative bounds definitions of numerical stability. The theoretical results have been applied a Gaussian elimination, and have proved to be very effective means of both a prior
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreFiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al
... Show More