The struggle between two identities is a crucial subject everywhere. Some people travel abroad in quest of a new identity after struggling at home. People migrate and embrace a new identity for different reasons. They find themselves in a state of internal conflict as they navigate the tension between their newly adopted identities and their old ones. The individual is haunted and overwhelmed by their previous experiences. This research explores the universality of the subject matter by examining the motivations underlying the adoption of a new identity in a distinct geographical and temporal context. This paper examines the literary works of Kincaid's Lucy (1990) and Blasim's "The Nightmares of Carlos Fuentes" (2014). Kincaid’s protagonist lives an internal conflict as she yearns for the life she once lived with her family, while also attempting to establish a new identity in the United States. Blasim's narrative centers around a protagonist who experiences a profound internal conflict manifested via recurring nightmares pertaining to his Iraqi ethnicity. This study examines the subject matter via the lenses of psychology and postcolonial theory.
In this paper, a new method of selection variables is presented to select some essential variables from large datasets. The new model is a modified version of the Elastic Net model. The modified Elastic Net variable selection model has been summarized in an algorithm. It is applied for Leukemia dataset that has 3051 variables (genes) and 72 samples. In reality, working with this kind of dataset is not accessible due to its large size. The modified model is compared to some standard variable selection methods. Perfect classification is achieved by applying the modified Elastic Net model because it has the best performance. All the calculations that have been done for this paper are in
In his opus, Ted Hughes has annexed new and fresh territories of signification to the very notion of the literary animal. Building on the earlier modernist example of the Lawrencian legacy that dwells upon the question of animalism, Hughes seems to have stepped further into the terrain of the sheer struggle when, in his hands, the grotesquerie of survival and violence energizes the topos of the literary animal in his postmodern bestiary. In Hughes’s elemental poetic process this grotesquerie and violence stages the literary animal as a vital poetic device or motif that is finally restored to the primitive power of poetry. In his “Thrushes”, he thus defamiliarizes these tiny creatures’ acts of being to bring upfront into focus thi
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreThe recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med
... Show MoreGeomechanical modelling and simulation are introduced to accurately determine the combined effects of hydrocarbon production and changes in rock properties due to geomechanical effects. The reservoir geomechanical model is concerned with stress-related issues and rock failure in compression, shear, and tension induced by reservoir pore pressure changes due to reservoir depletion. In this paper, a rock mechanical model is constructed in geomechanical mode, and reservoir geomechanics simulations are run for a carbonate gas reservoir. The study begins with assessment of the data, construction of 1D rock mechanical models along the well trajectory, the generation of a 3D mechanical earth model, and runni
Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreThe research aims to identify the level of psychological pollution in Iraqi society and the significant differences in psychological pollution in the Iraqi society according to variables. A sample of (600) individuals randomly selected from all governorates of Iraq, with (285) males and (315) females was used in the current study. The researcher adopted the scale of (Muhammad, 2004) psychological pollution consisting of (118) items, which limited (46) items after modification distributed into four areas: denial and abuse of the civilized identity, attachment to foreign formal aspects, effeminacy, and anarchism. The results of the research showed that there is no statistical significance among the individuals of the research sample. They
... Show More