Language plays a major role in all aspects of life. Communication is regarded as the most important of these aspects, as language is used on a daily basis by humanity either in written or spoken forms. Language is also regarded as the main factor of exchanging peoples’ cultures and traditions and in handing down these attributes from generation to generation. Thus, language is a fundamental element in identifying peoples’ ideologies and traditions in the past and the present. Despite these facts, the feminist linguists have objections to some of the language structures, demonstrating that language is gender biased to men. That is, language promotes patriarchal values. This pushed towards developing extensive studies to substantiate sexism in language. The main question is: is language really sexist? This study employs a feminist stylistic analysis to investigate these theories, and takes the anti-feminist poetry as a springboard for that, for it addresses multiple issues objected to by feminism. The model adopted in this study is Sara Mills’s (1995) Feminist Stylistics which analyzes different structures of language that oppose feminism; English and Arab modern anti-feminist poetry is the genre that is investigated in this study. Besides, this study aims at revealing the societies’ inherent views about women along with investigating the feminist essential claim; that language is sexist. This is done by conducting both qualitative and quantitative analyses on the data. The current study has concluded that language in its pure form is not sexist; rather sexism is a personal and well as a societal attitude. Furthermore, there are certain items, especially in English, that can be regarded since English does not have a feminine form on its own; still, such items can always be avoided and other neutral items can be used instead. Finally, this study recommends that a feminist practical approach is required to track and omit gender bias in language from school books as it has a major effect on the ideology of society. It also recommends to developing a feminist method to raise the awareness against the indirect forms of sexism that plague literature.
Leishmania parasites are the causative agent of leishmaniasis. Many studies are inspecting chemical drugs, including the use of miltefosine and amphotericin B, but curative values may be limited for these drugs with side effects due to the chemical origin, therefore, investigating less toxic therapies is essential. The aim of this study was to investigate the effectiveness of artemisinin on Iraqi strain of Leishmania tropica, by experimental macrophage ex vivo infection of amastigotes into mouse macrophage cell-line RAW264.7. Different concentrations (100, 200, 300, 400, 500)μM of artemisinin (ART) were screened to examine the susceptibility of L. tropica amastigotes to invade macrophage cell line along three times of follow up (24, 48 and
... Show MoreLeishmania parasites are the causative agent of leishmaniasis. Many studies are inspecting chemical drugs, including the use of miltefosine and amphotericin B, but curative values may be limited for these drugs with side effects due to the chemical origin, therefore, investigating less toxic therapies is essential. The aim of this study was to investigate the effectiveness of artemisinin on Iraqi strain of Leishmania tropica, by experimental macrophage ex vivo infection of amastigotes into mouse macrophage cell-line RAW264.7. Different concentrations (100, 200, 300, 400, 500)μM of artemisinin (ART) were screened to examine the susceptibility of L. tropica amastigotes to invade macrophage cell line along three times of follow up (24, 48 and
... Show More<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e
... Show MoreIn this paper, the finite element method is used to study the dynamic behavior of the damaged rotating composite blade. Three dimensional, finite element programs were developed using a nine node laminated shell as a discretization element for the blade structure (the same element type is used for damaged and non-damaged structure). In this analysis the initial stress effect (geometric stiffness) and other rotational effects except the carioles acceleration effect are included. The investigation covers the effect speed of rotation, aspect ratio, skew angle, pre-twist angle, radius to length, layer lamination and fiber orientation of composite blade. After modeling a non-damaged rotating composite blade, the work procedure was to ap
... Show MoreWorldwide, there is an increased reliance on COVID-19-related health messages to curb the COVID-19 outbreak. Therefore, it is vital to provide a well-prepared and authentic translation of English-language messages to reach culturally and linguistically diverse audiences. However, few studies, if any, focus on how non-English-speaking readers receive and linguistically accept the lexical choices in the messages translated into their language. The present study tested a sample of translated Arabic COVID-19-related texts that were obtained from the World Health Organization and Australian New South Wales Health websites. This study investigated to that extent Arabic readers would receive translated COVID-19 health messages and whether the t
... Show MoreArabic calligraphy has great importance in the printing designs that are often on the written character-based to perform functional goals and to achieve some of the aesthetic values in design work, has led major developments in the field of computer manufacturing and design software for the design and layout to increase to deal with the programmed character for the purposes of typesetting has confronted this Find the Arab character programmed for the purposes of typesetting for the detection of the most important design interventions that underwent the Arabic letter written to turn it into a programmed image intended for the purposes of the printing and typesetting has been addressed in the context of which the theoretical types of
... Show MoreBackground: Oral pyogenic granuloma (PG) is a clinicopathological entity that could develop due to the reaction to a variety of stimuli, such as low-grade local irritation, traumatic damage, and hormonal stimulation. There are two histopathological types of pyogenic granuloma; lobular type -capillary hemangioma (LCH) and non-lobular type; with PG,LCH has highly vascular, diffuse capillary growth while non- lobular variant mimicking granulation tissue with heavily inflammated stroma. The study aims were to review the clinical and histopathological spectrum of an oral pyogenic granuloma from different intraoral sites in order to avoid diagnostic pitfalls associated with similar morphological lesions and to determine
... Show MoreThe current study aimed to reveal the moral values available in the Arabic language textbook (Al-Mu’nes) for grades eleven and twelve for post-basic education in the Sultanate of Oman. The researcher adopted the descriptive approach using the sentence as measuring unit in the analysis process. The five fields of moral values and their subcategories values represented the categories of the analysis. Iterations of values and the percentages of iteration were calculated in those textbooks. Moreover and the analysis and stability of the process were confirmed.
After referring to previous studies, it was possible to de
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show More