To approach the problem of individual oppression with an international perspective drawing on Foucauldian concepts, this paper compares George Orwell’s 1984 (1949) and the Iraqi Sinan Antoon’s I’jaam (2004), which was translated into English in 2007. Even though Orwell and Antoon come from dissimilar cultural backgrounds, religions and epochs, they have tackled the issue of individuals’ oppression through their oppressed characters in a strikingly similar way. Hence, by applying the theories of both the American School of Comparative Literature and Foucauldian concepts, the current study attempts to establish a relationship between the Western and Eastern ways of dealing with the issue of oppression as an international problem in au
... Show MoreAlloys of GaxSb1-x system with different Ga concentration (x=0.4, 0.5, 0.6) have been prepared in evacuated quartz tubes. The structure of the alloys were examined by X-ray diffraction analysis (XRD) and found to be polycrystalline of zincblend structure with strong crystalline orientation (220). Thin films of GaxSb1-x system of about 1.0 μm thickness have been deposited by flash evaporation method on glass substrate at 473K substrate temperature (Ts) and under pressure 10-6 mbar. This study concentrated on the effect of Ga concentration (x) on some physical properties of GaxSb1-x thin films such as structural and optical properties. The structure of prepared films for various values of x was polycrystalline. The X-ray diffraction analy
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreThis paper presents an analytical study for the magnetohydrodynamic (MHD) flow of a generalized Burgers’ fluid in an annular pipe. Closed from solutions for velocity is obtained by using finite Hankel transform and discrete Laplace transform of the sequential fractional derivatives. Finally, the figures are plotted to show the effects of different parameters on the velocity profile.
Normal concrete is weak against tensile strength, has low ductility, and also insignificant resistance to cracking. The addition of diverse types of fibers at specific proportions can enhance the mechanical properties as well as the durability of concrete. Discrete fiber commonly used, has many disadvantages such as balling the fiber, randomly distribution, and limitation of the Vf ratio used. Based on this vision, a new technic was discovered enhancing concrete by textile-fiber to avoid all the problems mentioned above. The main idea of this paper is the investigation of the mechanical properties of SCC, and SCM that cast with 3D AR-glass fabric having two different thicknesses (6, 10 mm), and different layers (1,2 laye
... Show MoreAbstract The wavelet shrink estimator is an attractive technique when estimating the nonparametric regression functions, but it is very sensitive in the case of a correlation in errors. In this research, a polynomial model of low degree was used for the purpose of addressing the boundary problem in the wavelet reduction in addition to using flexible threshold values in the case of Correlation in errors as it deals with those transactions at each level separately, unlike the comprehensive threshold values that deal with all levels simultaneously, as (Visushrink) methods, (False Discovery Rate) method, (Improvement Thresholding) and (Sureshrink method), as the study was conducted on real monthly data represented in the rates of theft crimes f
... Show MoreThroughout this paper we introduce the concept of quasi closed submodules which is weaker than the concept of closed submodules. By using this concept we define the class of fully extending modules, where an R-module M is called fully extending if every quasi closed submodule of M is a direct summand.This class of modules is stronger than the class of extending modules. Many results about this concept are given, also many relationships with other related concepts are introduced.
Objective: To assess prospectively functional outcome of interlocked intramedullary nailing fixation in management of closed tibia shaft fractures. Methodology: This prospective study included 134 patients with closed shaft tibia fractures with age 18-60 years and isolated closed fracture of shaft of tibia. The fractures were fixed by interlocking intramedullary nail. At follow-up after 12 months postoperatively, the functional outcome was assessed radiographically for the sign of union and clinically according to Klemm-Borner criteria. Results: The mean age was 38.55 years. Out of 134 patients, 55.2% were male. The cause was road traffic accident in 44.8%, majority of the fracture occur in the mid-shaft (41.8%), and oblique fracture was th
... Show MoreScientific development has occupied a prominent place in the field of diagnosis, far from traditional procedures. Scientific progress and the development of cities have imposed diseases that have spread due to this development, perhaps the most prominent of which is diabetes for accurate diagnosis without examining blood samples and using image analysis by comparing two images of the affected person for no less than a period. Less than ten years ago they used artificial intelligence programs to analyze and prove the validity of this study by collecting samples of infected people and healthy people using one of the Python program libraries, which is (Open-CV) specialized in measuring changes to the human face, through which we can infer the
... Show More