The present study is concerned with the writer's ideologies towards violence against women. The study focuses on analyzing violence against women in English novel to see the extent the writers are being affected and influenced by their genders. It also focuses on showing to what extent the writer's ideologies are reflected in their works. Gender influences social groups ideologies; therefore, when a writer discusses an issue that concerns the other gender, they will be either subjective or objective depending on the degree of influence, i.e., gender has influenced their thoughts as well as behaviors. A single fact may be presented differently by different writers depending on the range of affectedness by ideologies. The study aims to uncover the hidden gender-based ideologies by analyzing the discursive structure of a novel based on Van Dijk's model (2000) of ideology and racism. The selected novel is based on discussing violence against women. The study will later on reveal the real writer’s gender-based ideologies and whether the writer is a feminist or an anti-feminist? Or Is he prejudiced? Or Is he biased?
Jurisprudence of Imam women through Susan Book of blood money
Abstract
The method binery logistic regression and linear discrimint function of the most important statistical methods used in the classification and prediction when the data of the kind of binery (0,1) you can not use the normal regression therefore resort to binary logistic regression and linear discriminant function in the case of two group in the case of a Multicollinearity problem between the data (the data containing high correlation) It became not possible to use binary logistic regression and linear discriminant function, to solve this problem, we resort to Partial least square regression.
In this, search th
... Show MoreGiven that the Crimean and Congo hemorrhagic fever is one of the deadly viral diseases that occur seasonally due to the activity of the carrier “tick,” studying and developing a mathematical model simulating this illness are crucial. Due to the delay in the disease’s incubation time in the sick individual, the paper involved the development of a mathematical model modeling the transmission of the disease from the carrier to humans and its spread among them. The major objective is to comprehend the dynamics of illness transmission so that it may be controlled, as well as how time delay affects this. The discussion of every one of the solution’s qualitative attributes is included. According to the established basic reproductio
... Show MoreKinematics is the mechanics branch which dealswith the movement of the bodies without taking the force into account. In robots, the forward kinematics and inverse kinematics are important in determining the position and orientation of the end-effector to perform multi-tasks. This paper presented the inverse kinematics analysis for a 5 DOF robotic arm using the robotics toolbox of MATLAB and the Denavit-Hartenberg (D-H) parameters were used to represent the links and joints of the robotic arm. A geometric approach was used in the inverse kinematics solution to determine the joints angles of the robotic arm and the path of the robotic arm was divided into successive lines to accomplish the required tasks of the robotic arm.Therefore, this
... Show MoreAgricultural companies could push investment forward and help in production base variation and developing production techniques. They also play a significant role in organizing and providing requirements of market economy. This work aimed at studying economic efficiency of the six agricultural companies that are registered at Iraqi stock market for the period 2005-2016. Capital of these companies was between (300 million-7.5 billion IQD). Several financial analysis indicators were applied such as activity percentages. Average of capital circulation was 0.91 for private company of agricultural production، and lowest share was for Iraqi company for producing and marketing field crops. Assets average circulation was highest for the pr
... Show MoreA new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever
... Show MoreCognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections. Schema and text world theories are useful tools in cognitive stylistic studies. The reader's perception o
... Show MoreBN Rashid, AKF Jameel, Al- Ustath: Quarterly Scientific Journal, 2017 - Cited by 15
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More