Preferred Language
Articles
/
jcolang-711
Dimension feminine in The Respectful Prostitute’s Jean- Paul Sartre and The Blind Prostitute’s Badr Shaker al-Sayyabe: La dimension féminine dans La P….respectueuse de Jean-Paul Sartre et La Prostituée Aveugle de Badr Shaker al-Sayyabe
...Show More Authors

      Jean-Paul Sartre and Badr Shakir al-Sayyabe are among the most prominent writers that critiqued the destructive role of capitalism and the patriarchal power system in the period of the Post-World War II crisis. Divided into three chapters, the present study examines two of the most eminent literary works in the history of the Western and Eastern societies in the fifties of the last decade: Jean Paul Sartre’s play : The Respectful Prostitute and Badr Shaker al-Sayyabe’s poem: The Blind Prostitute.

       Chapter one discusses the position of the prostitute in a patriarchal societies. Chapter two linguistically analyzes the prostitute’s behavior with men and evaluates the nature of a relationship when based on profit and loss. Such a relationship exposes the male dominance system on this social level through stigmatizing, marginalizing and depriving of her family establishing rights. Chapter Three sheds light on the prostitute’s ego and the other. In the two works, the society double standard is presented in dealing with status of a woman, rather than a man, as a prostitute, something that leads to uncover the individuality of such a character. Thus, and in addition to justly picturing prostitution as a human setback in all the western and Eastern societies, Sartre and al – Sayyab succeed in visualizing humanity decay within the perspective of the preceding decades.

Résumé

 Jean-Paul Sartre et Badr Shakir al-Sayyabe font partie des écrivains qui ont contribué à travers leurs œuvres à critiquer le système capitaliste et la société masculine dans la période de l'après-guerre. En lisant les deux ouvrages, nous avons choisi comme sujet commun de cette étude d'analyser le statut de prostituée dans les sociétés orientale et occidentale au cours des années 1950 du siècle dernier. L'étude est divisée en trois chapitres :

Le premier chapitre est basé sur la présentation du statut de la prostituée dans les communautés masculines des deux auteurs. Le deuxième chapitre analyse linguistiquement le comportement de la prostituée envers les hommes et la nature de la relation basée sur le principe du profit ou de la perte. Cette relation met d'abord en évidence la domination du système masculin sur cette partie social, le problème de la stigmatisation sociale, de la marginalisation et de la privation de son droit d'avoir et de fonder une famille. Le troisième chapitre traite la position de la prostituée entre le moi et l'autre. Dans les deux œuvres, le point de vue de la société semble être un double standard dans la condamnation de la femme comme prostituée plutôt que comme homme. Ce mécanisme nous amène à retrouver l'identité de la prostituée. Nous arrivons à conclure que le succès de Sartre et d'al-Sayyabe en présentant cette profession comme un échec humain pour les sociétés orientales et occidentales et la décadence de l'homme ou de la femme et en les dépeignant avec une perspective qui correspond aux crises du siècle dernier.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 03 2025
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Theoretical Study of Thermal Cracking For Acenaphthylene Molecule
...Show More Authors

Density Functional Theory (DFT) calculations were carried out to study the thermal cracking for acenaphthylene molecule to estimate the bond energies for breaking C8b-C5a , C5a-C5 , C5-C4 , and C5-H5 bonds as well as the activation energies. It was found that for C8b-C5a , C5-C4 , and C5-H5 reactions it is often possible to identify one pathway for bond breakage through the singlet or triplet states. The atomic charges , dipole moment and nuclear – nuclear repulsion energy supported the breakage bond .Also, it was found that the activation energy value for C5-H5 bond breakage is lower than that required for C8b-C5a , C5a-C5 , C5-C4 bonds which refer to C5-H5 bond in acenaphthylene molecule are weaker than C8b-C5a , C5a-C5 , C5-C

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Data Mining Techniques for Iraqi Biochemical Dataset Analysis
...Show More Authors

This research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Sep 04 2016
Journal Name
Baghdad Science Journal
Bioadsorption of Heavy Metals From Industrial Wastewater Using Some Species of Bacteria
...Show More Authors

Three isolated bacteria were examined to remove heavy metals from the industrial wastewater of the Diala State Company of Electrical Industries, Diyala-Iraq. The isolated bacteria were identified as Pseudomonas aeruginosa, Escherichia coli and Sulfate Reducing Bacteria (SRB). The three isolates were used as an adsorption factor for different concentrations of Lead and Copper (100, 150, and 200 ppm.), in order to examine the adsorption efficiency of these isolates. In addition, the effect of three factors on heavy metals adsorption were examined; temperature (25, 30, and 37 ?C), pH (3 and 4.5) and contact time (2 and 24 hrs). The results showed that the highest level of lead adsorption was obtained at 37 ?C by E. coli, P, aerugenosa and

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
Some Results on Pure Submodules Relative to Submodule
...Show More Authors

Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be pure relative to submodule T of M (Simply T-pure) if for each ideal A of R, N?AM=AN+T?(N?AM). In this paper, the properties of the following concepts were studied: Pure essential submodules relative to submodule T of M (Simply T-pure essential),Pure closed submodules relative to submodule T of M (Simply T-pure closed) and relative pure complement submodule relative to submodule T of M (Simply T-pure complement) and T-purely extending. We prove that; Let M be a T-purely extending module and let N be a T-pure submodule of M. If M has the T-PIP, then N is T-purely extending.

View Publication Preview PDF
Crossref
Publication Date
Fri Feb 28 2025
Journal Name
Journal Européen Des Systèmes Automatisés
Decision-Making Model for Aircraft Landing Based on Fuzzy Logic Approach
...Show More Authors

An aircraft's landing stage involves inherent hazards and problems associated with many factors, such as weather, runway conditions, pilot experiences, etc. The pilot is responsible for selecting the proper landing procedure based on information provided by the landing console operator (LCO). Given the likelihood of human decisions due to errors and biases, creating an intelligent system becomes important to predict accurate decisions. This paper proposes the fuzzy logic method, which intends to handle the uncertainty and ambiguity inherent in the landing phase, providing intelligent decision support to the pilot while reducing the workload of the LCO. The fuzzy system, built using the Mamdani approach in MATLAB software, considers critical

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Dec 30 2012
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Hydrodynamic Pressure Gradient Correlation of Some Iraqi Oil Wells
...Show More Authors

Empirical equation has been presented to predict the optimum hydrodynamic
pressure gradient with optimum mud flow rate (one equation) of five Iraqi oil wells
to obtain the optimum carrying capacity of the drilling fluid ( optimum transport
cuttings from the hole to the surface through the annulus).
This equation is a function of mud flow rate, mud density and penetration
rate without using any charts or graphs.
The correlation coefficient accuracy is more than 0.9999.

View Publication Preview PDF
Publication Date
Sun Dec 01 2024
Journal Name
Materials Letters
Determination of third order susceptibility of carbon quantum dots at different concentrations
...Show More Authors

The nonlinear refractive (NLR) index and third order susceptibility (X3) of carbon quantum dots (CQDs) have been studied using two laser wavelengths (473 and 532 nm). The z-scan technique was used to examine the nonlinearity. Results showed that all concentrations have negative NLR indices in the order of 10−10 cm2/W at two laser wavelengths. Moreover, the nonlinearity of CQDs was improved by increasing the concentration of CQDs. The highest value of third order susceptibility was found to be 3.32*10−8 (esu) for CQDs with a concentration of 70 mA at 473 nm wavelength.

View Publication
Scopus Clarivate Crossref
Publication Date
Tue Mar 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On e-Small Submodules
...Show More Authors

Let M be an R-module, where R is a commutative ring with unity. A submodule N of M is called e-small (denoted by N e  M) if N + K = M, where K e  M implies K = M. We give many properties related with this type of submodules.

View Publication Preview PDF