In the present work, the image and representation of Adela, the youngest daughter of the family of the Casa de Bernarda Alba, one of the most popular works of the Spanish author Federico García Lorca (1898-1936), will be analyzed. In this work, there are different themes, but what concerns us is to show the repression, oppression and rebellion of this character in a context of customs of the 1920s in Spain. They are revealing elements in that period in which women were relegated to the background, despite the fact that a feminist movement had already begun in Spain. By studying Adela, we seek to see how a single woman confronts her family and the society that surrounds her to fight for freedom, although its end is finally linked to patriarchy.
Feature selection (FS) constitutes a series of processes used to decide which relevant features/attributes to include and which irrelevant features to exclude for predictive modeling. It is a crucial task that aids machine learning classifiers in reducing error rates, computation time, overfitting, and improving classification accuracy. It has demonstrated its efficacy in myriads of domains, ranging from its use for text classification (TC), text mining, and image recognition. While there are many traditional FS methods, recent research efforts have been devoted to applying metaheuristic algorithms as FS techniques for the TC task. However, there are few literature reviews concerning TC. Therefore, a comprehensive overview was systematicall
... Show MoreProgression in Computer networks and emerging of new technologies in this field helps to find out new protocols and frameworks that provides new computer network-based services. E-government services, a modernized version of conventional government, are created through the steady evolution of technology in addition to the growing need of societies for numerous services. Government services are deeply related to citizens’ daily lives; therefore, it is important to evolve with technological developments—it is necessary to move from the traditional methods of managing government work to cutting-edge technical approaches that improve the effectiveness of government systems for providing services to citizens. Blockchain technology is amon
... Show MoreAlot of medical and industrial applications used the metal nanoparticles (NPs) with increase interest to be used as cancer therapy. The current work aimed to prepare AuNPs and AgNPs through the use of plasma jet and test their antitumor mechanism of apoptosis induction. The results indicating the face-centered cubic structures and crystalline nature of AuNPs and AgNPs. Also, the image of FESEM showed that the well dispersions regarding AuNPs and AgNPs, while the NP’s spherical shape with the particle size distributions which are considered to be close that estimated from the XRD. cytotoxicity have been assessed against the Normal embryonic cell line REF and the digestive system (HC , SK-GT-4) cell lines under a variety of the seri
... Show MoreThis work includes the synthesis of new ester compounds containing two 1,3,4-oxadiazole rings, 15a-c and 16a-c. This was done over seven steps, starting with p-acetamido-phenol 1 and 2-mercaptobenzoimidazole 2. The structure of the products was determined using FT-IR, 1H NMR, and mass spectroscopy. The evaluation of the antimicrobial activities of some prepared compounds was achieved against four types of bacteria (two types of gram-positive bacteria; Staphylococcus aureus and Bacillus subtilis, and two types of gram-negative bacteria, Pseudomonas aeruginosa and E. Coli), as well as against one types of fungus (C. albino). The results show moderate activit against the study bacteria, and the theoretical analysis of the toxi
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreThe concept of intertextuality was one of the problems that occupied the attention of critics and critics in targeting the structure of textual intertextuality between texts and their overlap in the process of producing meaning. Until intertextuality became a stable term and it can be monitored in the structure of the theatrical text and determining the mechanisms of this intertextuality between texts through fields and classifications agreed upon by the most important critics who wrote and considered intertextuality. Perhaps our previous research (the approach of exposure in the epistemological hallway to intertextuality) was an attempt to interview a terminology, which the researcher intended to monitor, through the mechanisms of inter
... Show MoreUtilizing the modern technologies in agriculture such as subsurface water retention techniques were developed to improve water storage capacities in the root zone depth. Moreover, this technique was maximizing the reduction in irrigation losses and increasing the water use efficiency. In this paper, a polyethylene membrane was installed within the root zone of okra crop through the spring growing season 2017 inside the greenhouse to improve water use efficiency and water productivity of okra crop. The research work was conducted in the field located in the north of Babylon Governorate in Sadat Al Hindiya Township seventy-eight kilometers from Baghdad city. Three treatments plots were used for the comparison using surface
... Show More