Preferred Language
Articles
/
DxemeJIBVTCNdQwCibF0
The Iraqi countryside in a novel (Exceeded border)
...Show More Authors

The novel was generally distinguished from other literary arts in its connection with the living reality as an imaginative practice that relies on political, economic, social, intellectual and cultural references and as a crucial tool in reading cultural references and dive deep into reality. As every novelist has a vision to embody this reality. As every novelist has a vision to embody this reality. The novel of ("Exceeded border by Hammed Al-Kafa’i) is a considered a fertile field for presenting social issues in their apparent structure and revealing the cultural patterns behind them which lies in its deep structure. The novel here moves its characters in its imaginary world in a way that it becomes more capable of adaptation and crystallization of (cultural statements) that control the behaviour of characters, develop the narrative event and monitor personality transformations in rural society. The pattern of (class disparity) is dominates the joints of social life in the Iraqi countryside, as (AL-Saied) *4 enjoy those whose belongs by descent or race to the prophet Mohammed (Salaa Allah Ealayh Wasalam) * with enjoy special privileges not available to a (commoners) which reinforces the idea of class disparity in the Iraqi countryside. Within a male society in which the man imposed his control with strict provisions, the material and civil rights of women were lost and turned into a means and a tool to be to be exchanged according to the map of male interests, between a minor girl who is forced to marry under the saying (Kisma)* and another confiscates her freedom to choose her life partner and she is forced to marry her cousin under the saying (Al-Nahwa)* , and another is forcing her to stop her social life and cancel her feelings if her husband dies under the saying (loyalty to the husband after his death) and other sayings that tightened the noose on women in all their forms.

Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (35)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of The College Of Languages (jcl)
Literature and Novel: Classical novel in comparison to New Novel By Alain Robbe - Grillet: L'Art et le Roman: Le Roman Traditionnel Face au Nouveau Roman Alain Robe- Grillet
...Show More Authors

Modern French novel has gained a distinctive status in the history of French literature during the first half of the twentieth century. This is due to many factors including the new literary descriptive objective style adopted by novelists like Alain Robbe – Grillet that  has long been regarded as the outstanding writer of the nouveau roman, as well as its major spokesman, a representative writer and a leading theoretician of the new novel that has broken the classical rules of the one hero and evolved, through questioning the relationship of man and the world and  reevaluating the limits of contemporary fiction , into  creating a new form of narrative.

Résumé:

En vue de résu

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 11 2017
Journal Name
Al-academy
The approach of deliberation in the ontemporary Iraqi theater text - theatricality Afwah-as a odel
...Show More Authors

The deliberative system of communicative studies is exposed to cultural openness, according to modern cultural studies, to establish a verbal language system that achieves reciprocal and cross-cultural relations. This research has examined the concept of deliberative approach in the contemporary Iraqi theater text by studying the deliberative system of text and its interrelationship with The stage of the verbal embodiment of the dramatic event, because the dramatic text achieves in its construction of racism, a deliberative approach between the verbal event and the language, and what later leads to the completion of the dramatic action. The research included four chapters. The first chapter was the systematic framework of the research, T

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 15 2021
Journal Name
Al-academy
Processes directing the scenographic space in the Iraqi theatrical show Shakespeare texts as a model
...Show More Authors

View Publication
Crossref
Publication Date
Wed Sep 15 2021
Journal Name
Al-academy
Processes directing the scenography space in the Iraqi theatrical show Shakespeare texts as a model
...Show More Authors

Publication Date
Tue Dec 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
The role of MIS in the negotiation process "An Analytical Study in a Sample of Iraqi Organizations"
...Show More Authors

Negotiation is considered as one of the most important kinds of communication in the contemporary organizations, which depend on the important role of managerial information systems in providing necessary and suitable information for success of the negotiation process.

Accordingly, this study aims at measuring the extent of the variables effect of managerial information system in the negotiation process.

To achieve this study, two hypotheses were chosen; the first is the correlation relation and the second is the effect, and statistical means represented by correlation coefficient "Spearman" and (R2) were used.

 A Number of conclusions were

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 24 2022
Journal Name
Egyptian Journal Of Chemistry
A novel Tubular Electrochemical Reactor with a Spiral Design of Anode for Treatment of Petroleum Refinery Wastewater
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref