The other is a problematic concept and can be achieved only by the existence of difference and differentiation between human groups in views and views, the other is out of the ego, which is different religiously, politically, socially, culturally, place and language.
We take from the Iraqi feminist novel analytical field to reflect the image of the other in the novelist world, and the models chosen for the study are: the novel granddaughter of American novelist Anaam Kjie Ji, and novel how the sky seemed close to the novelist Batoul al-Khudairi, and novel when you wake up the smell of novelist Dni Ghali, and the rope of the umbilical and the novel Shufuni Shufuni The novel by Samira Al-Manea, the novelist of the novelist Alia Mamdouh,
Introduction: Methadone hydrochloride (MDN) is an effective pharmacological substitution treatment for opioids dependence, adopted in different countries as methadone maintenance treatment (MMT) programmes. However, MDN can exacerbate the addiction problem if it is abused and injected intravenously, and the frequent visits to the MMT centres can reduce patient compliance. The overall aim of this study is to develop a novel extended-release capsule of MDN using the sol-gel silica (SGS) technique that has the potential to counteract medication-tampering techniques and associated health risks and reduce the frequent visits to MMT centres. Methods: For MDN recrystallisation, a closed container method (CCM) and hot-stage method (HSM) were conduc
... Show MoreThe synthesis, characterization and liquid crystalline properties of N4,N40-bis((1 H-benzo[d]imidazol-2- yl)methyl)-3,30-dimethyl-[1,10-biphenyl]-4,40-diamine and of their corresponding Mn(II), Fe(II), Ni (II), Cu(II), and Zn(II) complexes are described. The ligand and complexes have been characterized by elemental analysis, magnetic susceptibility measurements (meff), conductometric measurements and Fourier Transform Infrared (FTIR), Nuclear Magnetic Resonance (1H NMR), (13C-NMR) and UV–Vis spectroscopy. Spectral investigations suggested octahedral coordination geometrical arrangement for M(II) complexes. The phase transition temperatures were detected by differential scanning calorimetry (DSC) analysis and the phases are confirmed by op
... Show MoreThis research deals with the study of the identity lost in the novel (handcuffs of paper) by Writer (Kuwaiti / Iraqi ) Yousif Hadi Mays.This is because of The strange subject presented by the writer ,Kuwait has chosen a sbace for his novel and chose apurely Kuwaiti theme. Hence the importance of the novel, as it came to the subject of identity completely dntdiffere from what we wwrote after the fall off the regime (2003), Which is related to the last coming from outside the country, which remained oscillataing between his mother,s identity where language, religion and history and the identity of the other by virtue and dazzling, and integration and here con not belong to either party. This is a violation of the taboos of
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreA (k,n)-arc is a set of k points of PG(2,q) for some n, but not n + 1 of them, are collinear. A (k,n)-arc is complete if it is not contained in a (k + 1,n)-arc. In this paper we construct complete (kn,n)-arcs in PG(2,5), n = 2,3,4,5, by geometric method, with the related blocking sets and projective codes.
The Mesopotamian soil is muddy and fertile, and so from ancient eras Iraqis used mud in their building, settlements and architecture in different methodologies according to the nature and the function of the building that was either in its pure form or by mixing it with other materials such as straw . also as raw bricks in different ways either for the whale building or parts of it, or for the finishing parts such as roofing for instance. In this research these different forms and methodologies will permeate through out a chosen examples of historical building, rural buildings and settlements and ancient buildings as well as some current uses of mud in the structures and building in standing cities, this in order to conclude some
... Show MoreA two-dimensional computational study had been performed regarding aerodynamic forces and pressures affecting a cambered inverted airfoil, CLARK-Y smoothed with ground effects by solving the Reynolds-averaged Navier-Stokes equations, using the commercial software COMSOL Multiphysics 5.0 solver. Turbulence effects are modeled using the Menter shear-stress transport (SST) two-equation model. The negative lift (down-force), drag forces and pressures surface were predicted through the simulation of wings over inverted wings in different parameters namely; varying incidences i.e. angles of attack of the airfoils, varying the ride hide from the ground covering various force regions, two-dimensional cross-section of the inverted front wings to be
... Show More