This paper examines the decolonizing methods used by Leslie Marmon Silko in her novel Ceremony (1977) to heal the indigenous people from the patriarchal traditions of the white hegemony. This study aims to emphasize the vulnerable responses of the Pueblo people to the memories of the clan and to highlight Silko’s methods to sustain the history and lifestyle of the indigenous people. Therefore, Silko’s novel can be situated historically and culturally within memory-studies. To analyze the contrasting behaviors of characters, this paper projects the relationship between the collective patriarchal doctrines and that of the individual within the framework of memory studies. Theories of Jan and Aleida Assmann are used here to explore the chronicle struggle of the indigenous people and to maintain the memory and tradition of the clan. Memory studies can best describe this novel since Silko believes there is a systematic shift in dislocating the memories of the place. This cultural displacement, the Pueblo people are specifically facing, happens when the young people lose their memories of the tribe and forget their traditions. The memory-studies then establish an intersection not only between the collective and the individual but also between the white hegemony and the Indigenous culture. The paper concludes that memories of the clan can be regained through specific forms of ceremonies, narratives, or any institutional formation. Therefore, Silko’s novel has entertained the possibility of cultural and historical communication- within memory studies- that may succeed in stimulating the attention of the young generation.
The research topic (The Impact of the Compulsory Reserve on the Banks Credit-an applied research on a sample of Iraqi banks), was chosen on basis of the Iraqi private Banks attempts to increase their credit activities in hope to gain more profits.This coincided with the CBI aim to back the private banking market.It is thus apparent why the CBI issued its regulation to those banks to increase their capitals up to IDB250. On the other hand,the CBI acted as an obstacle in the way of increasing the private banks of their capitals,that is by implementing the quantitive monetary tool so called the compulsory reserve.This is why we intended to overlook at this contradictional problome
... Show MoreAbstract
The current study was conducted to assess the effect of advancing age on total serum IgE level in asthmatic patients. To this purpose, 90 asthmatic patients and 30 healthy individuals ( control group ) were enrolled. Asthmatic patients were categorized into four groups. Group A consisted of asthmatic patients (9) whose age was more than 20 and up to 30 y. Group B contained asthmatics (13) of age more than 30 and up to 40 y. Group C comprised those (23) of more than 40 and up to 50 y. Group D consisted asthmatic patients (45) of age more than 50 y. Total serum IgE level significantly changed in group D patients when compared with those of
Water provision is sensitive to climate change, and agricultural production and food supply are sensitive to water availability. Water scarcity affects food security and agricultural economic development through changes in agricultural production and changes in the composition of produced goods. Recent droughts also led to a decrease in the volume of water allocated to agriculture, which led to a decrease in total agricultural production and exports, and this has subsequent impacts on food security and economic development. The research aimed to measure the impact of water scarcity on agricultural economic development for the period 1990-2022. The research included three behavioral equations with three endogenous variables: the cult
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreThis study aims to reveal the role of one of the artificial intelligence (AI) techniques, “ChatGPT,” in improving the educational process by following it as a teaching method for the subject of automatic analysis for students of the Chemistry Department and the subject of computer security for students of the Computer Science Department, from the fourth stage at the College of Education for Pure Science (Ibn Al-Haitham), and its impact on their computational thinking to have a good educational environment. The experimental approach was used, and the research samples were chosen intentionally by the research community. Research tools were prepared, which included a scale for CT that included 12 items and the achievement test in b
... Show Morethis research paper aims at measuring and analyzing the influence of the stock exchange on the economic development in the Kingdom. This is done through comparing the Gross Domestic Product (GDP) as a changeable factor affiliated with some independent variables in the KSA stock exchange. These variables are (All Share Index {TASI}, Market Value, Trade Volume Index, number of companies and number of shares). The study covers the period from 2003 to 2017 and adapts the measuring method in analyzing this relation using the Multiple Linear Regression (Stepwise) and (SPSS). The study affirmed the validity of the
... Show MoreE-learning is a necessity imposed by the Corona pandemic, which has disrupted various educational institutions in the world, but some of these institutions have not been affected and education has continued with them, due to their flexible educational system that was able to employ technology in the continuity of the educational process in the so-called e-learning, because It has characteristics that make it the most suitable alternative to avoid the consequences of the Corona pandemic and its damage to the educational process, as e-learning is one of the modern methods that contribute to enhancing the effectiveness of the learner, and enabling him to assume greater responsibility compared to traditional education, so the learner becomes
... Show MorePraise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and upon his family and companions.
And after:
Muslim scholars have fought in the extent of regard to these interests, each according to his opinion and according to his evaluation, and his consideration of this interest, but it remains important that the legislation in them needs more precaution and caution against the predominance of passions, because the passions often decorate spoilers so they see an interest, so practical application must To realize the spirit of Islamic Sharia in its entirety of its rulings, and the preponderance between the interests and evils that prevail in our societies, which c
... Show More