ES Hussein
This paper offers a postcolonial analysis of Sudanese author Tayeb Salih's novel Season of Migration to the North (1966), emphasizing the interplay between indigenous and colonial narratives. The analysis centers on the protagonist, Mustafa Sa'eed, who embodies its essence. The character of Mustafa Saeed represents the intricate interplay between colonial and indigenous elements. This research employs Edward Said's postcolonial concept, Contrapuntal Reading (1993), which underscores the interconnection of the histories of colonizers and the colonized through the portrayal of Mustafa Saeed's character, focusing on the mechanisms of colonial power, such as cultural hegemony, identity manipulation, and the resistance of the colonized.
... Show MoreThis study aimed to measure digital stress among students at the University of Baghdad and to identify differences in digital stress based on gender (male–female), academic level (first–fourth year), and field of study (scientific–humanities). The study sample consisted of 200 students from the University of Baghdad. The "Digital Stress" scale, developed by the researcher specifically for this study, was applied, and the descriptive-analytical method was adopted. After administering the scale and analyzing the results using appropriate statistical methods, the findings indicated that university students experience a high level of digital stress, while no statistically significant differences were found in digital stress accord
... Show MoreSome maps of the chaotic firefly algorithm were selected to select variables for data on blood diseases and blood vessels obtained from Nasiriyah General Hospital where the data were tested and tracking the distribution of Gamma and it was concluded that a Chebyshevmap method is more efficient than a Sinusoidal map method through mean square error criterion.
The security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreIn view of the large profits made by the sex trade on the one hand, and the minor penalties imposed on the traffickers (brokers) compared with the severe penalties imposed on the drug trade and illegal weapons, on the other hand, this trade has become popular and spread in most countries of the world, and the cornerstones of this trade and A safe haven for them is hotels, especially luxury ones with international brands where their guests are rich and some may look for sex for money. Given the great physical and psychological damage to the victims, this research highlights the civil liability of hotels towards these victims in US and Iraqi law.In order not to limit the
... Show MoreBackground: The development of orthodontic biomaterials that attract less biofilm has been a goal for decades. Adhesion and colonization of cariogenic streptococci are considered to play key roles in the development of enamel demineralization related to orthodontic materials. The aim of this study was to quantitatively evaluate the Mutans streptococci adhesion to coated orthodontic archwires (Epoxy and Teflon) and uncoated archwires (stainless steel and nickel-titanium) with respect to incubation time in the presence and absence of saliva. Material and Method: Six types of archwires stainless steel and nickel titanium with two type of coating (Epoxy, Teflon) were used in this study. Twelve specimens of each archwire were incubated in steri
... Show MoreThe current study introduces a novel technique to handle electrochemical localized corrosion in certain limited regions rather than applying comprehensive cathodic protection (CP) treatment. An impressed current cathodic protection cell (ICCPC) was fabricated and firmly installed on the middle of a steel structure surface to deter localized corrosion in fixed or mobile steel structures. The designed ICCPC comprises three essential parts: an anode, a cathode, and an artificial electrolyte. The latter was developed to mimic the function of the natural electrolyte in CP. A proportional-integrated-derivative (PID) controller was designed to stabilize this potential below the ICCPC at a cathodic potential of −850 mV, which is crucial for prote
... Show MoreThe aim of this study is to identify the effect of enabling the effectiveness of the work of the audit committees in private commercial banks and to identify the extent of awareness of the importance of empowerment in the work of these committees, especially as it is known that these committees, especially the inspection committees that go to private banks and from various sources including committees of the Central Bank of Iraq Committees of the Securities Commission and finally committees of the external audit offices, through an analysis of the determinants of empowerment in the performance of the most important work of the audit committees, namely: supervising the process of preparing reports, supervising the system of intern
... Show More