Preferred Language
Articles
/
4RdZHo4BVTCNdQwCgTFE
“They’ve damaged your uniqueness”: Technology as a Source of Dystopia in Caryl Churchill’s A Number
...Show More Authors

This study focuses on the impact of technology on creating a dystopian world as presented by the English playwright Caryl Churchill in her play A Number (2002). This dramatic work came as a reaction to the most crucial and valuable turning point in the scientific achievements of human engineering, namely, the cloning of the sheep called Dolly. Therefore, A Number is a play that presents an analytical stage for imagining the biotechnological and scientific future. This dramatic vignette captures the playwright’s fears towards the abnormal progress of technology and science and how far such technological progress affects human relationships and identity. It also portrays how technological progress results in the feeling of a lack of ‘uniqueness’ and potential psychological problems. It shows that biotechnological attempts at human cloning are the heights of science irresponsibility. Human beings desire to have children, but there are limits to this desire. It should not include whatever kind of technology is available to meet such desires. The playwright, through her dramatic characters Salter, B1, B2 and Michael Black, draws a ‘near’ futuristic world in which the misuse of technology raises ethical, scientific, medical and legal

Crossref
View Publication
Publication Date
Mon Feb 16 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Biomechanical evaluation of porous titanium implants (CpTi) fabricated by powder technology
...Show More Authors

Background: It may be an important prospective clinical use of manufacturing of porous implant for clinical situations, such as cases of limitation in bone height, low bone density .The small segment of porous implant an effective osseointegration allows increasing in contact area provided for small segmented porous provided by its surface configuration. This study was done to Fabricate porous titanium implants by powder technology, as well as the observation of removal torque values of porous titanium implants compared to smooth titanium implants. Materials and methods: Twenty porous titanium implants (3.2mm in diameter and 8mm in length) were manufactured by powder technology using commercially pure titanium powder of ≤75um part

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
Communications And Network
Link and Cost Optimization of FTTH Network Implementation through GPON Technology
...Show More Authors

View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Physics: Conference Series
Development of carbon nanotubes catalyst supported for alkaline fuel cell technology
...Show More Authors
Abstract<p>Study of the development of an activated carbon nanotube catalyst for alkaline fuel cell technology. Through the prepared carbon nanotubes catalyst by an electrochemical deposition technique. Different analytical approaches such as X-ray diffraction (XRD) to determine the structural properties and Scanning Electron Microscope (SEM), were used to characterize, Mesh stainless steel catalyst substrate had an envelope structure and a large surface area. Voltages were also obtained at 1.83 V and current at 3.2 A of alkaline fuel cell. In addition, study the characterization of the electrochemical parameters.</p>
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of The College Of Languages (jcl)
Metaphor in Political Discourse Press Articles By Louis Bassets As A Model: La metáfora en el discurso político. Los artículos de Lluís Bassets como ejemplo
...Show More Authors

       The present paper focuses on studying a rhetorical form often used in Spanish linguistic discourse .It also examines the study two sides (theoretical and practical), the concept of metaphor, the most important modern school that deals with this issue, the development of this technique and its relationship with other intellectual ideologies, and the role metaphor plays in interpreting the meaning of the linguistic discourse especially in conveying political message. The study allows the formulation and the creation of a conceptual picture for the purposes of metaphor in the linguistic discourse used in Spanish press. It investigates discursive models from the Spanish press,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 05 2019
Journal Name
Cardiff University
Technology development for nanoscale InSb quantum split-gate structures
...Show More Authors

Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
Typographic Accomplishment between the Manual Skill and Contemporary Technology
...Show More Authors

     The typographic accomplishment is the most important means of cognitive communication and carries a message from the sender to the recipient which serves a certain objective functionally, economically and advertisingly.

            The design of typographic accomplishment depends on two different techniques, the first is manual, which depends on the skill, training and individual achievement of the designer and his ability to design and produce typographic accomplishment with manual skill effects. The second one is the contemporary digitization which is represented by computers, programs and printers attached to them. The problem of the current resear

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Int. J. Nonlinear Anal. Appl.
A topology on a ring part of is-algebra
...Show More Authors

Scopus (2)
Scopus Clarivate
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Petroleum Science And Engineering
Organic geochemistry of hydrocarbon seeps associated with sulfurous spring water, western Iraq: Biodegradation, source rock and sedimentary environment
...Show More Authors

View Publication
Crossref (8)
Crossref
Publication Date
Fri Mar 01 2013
Journal Name
Applied Mechanics And Materials
Measure and Analyze the Problems of Concrete Mixture Production via Six Sigma DMAIC Tools: Central Concrete Mix Plant as a Case Study
...Show More Authors

The aims of this study are to measure the defect rate and analyze the problems of production of ready concrete mixture plant by using Six Sigma methodology which is a business strategy for operations improvement depending basically on the application of its sub-methodology DMAIC improvement cycle and the basic statistical tools where the process sigma level of concrete production in the case study was 2.41 σ.

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref