Preferred Language
Articles
/
LRiAbpcBVTCNdQwCIZgm
Conflict of Identities Among Immigrants: A Study of Jamaica Kincaid’s Lucy and Hassan Blasim’s Nightmares of Carlos Fuentes صراع الهويات بين المهاجرين: دراسة في قصة لوسي لجامايكا كينكايد وقصة حسن بلاسم كوابيس كارلوس فوينتس
...Show More Authors

The struggle between two identities is a crucial subject everywhere. Some people travel abroad in quest of a new identity after struggling at home. People migrate and embrace a new identity for different reasons. They find themselves in a state of internal conflict as they navigate the tension between their newly adopted identities and their old ones. The individual is haunted and overwhelmed by their previous experiences. This research explores the universality of the subject matter by examining the motivations underlying the adoption of a new identity in a distinct geographical and temporal context. This paper examines the literary works of Kincaid's Lucy (1990) and Blasim's "The Nightmares of Carlos Fuentes" (2014). Kincaid’s protagonist lives an internal conflict as she yearns for the life she once lived with her family, while also attempting to establish a new identity in the United States. Blasim's narrative centers around a protagonist who experiences a profound internal conflict manifested via recurring nightmares pertaining to his Iraqi ethnicity. This study examines the subject matter via the lenses of psychology and postcolonial theory.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Fuel
Biodiesel from batch and continuous oleic acid esterification using zeolite catalysts
...Show More Authors

View Publication
Scopus (89)
Crossref (90)
Scopus Clarivate Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Regression shrinkage and selection variables via an adaptive elastic net model
...Show More Authors
Abstract<p>In this paper, a new method of selection variables is presented to select some essential variables from large datasets. The new model is a modified version of the Elastic Net model. The modified Elastic Net variable selection model has been summarized in an algorithm. It is applied for Leukemia dataset that has 3051 variables (genes) and 72 samples. In reality, working with this kind of dataset is not accessible due to its large size. The modified model is compared to some standard variable selection methods. Perfect classification is achieved by applying the modified Elastic Net model because it has the best performance. All the calculations that have been done for this paper are in </p> ... Show More
View Publication
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Swarm And Evolutionary Computation
Algorithmic design issues in adaptive differential evolution schemes: Review and taxonomy
...Show More Authors

View Publication
Scopus (215)
Crossref (200)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of The College Of Languages (jcl)
The Literary Animal and the Grotesque Survival in Ted Hughes’s “Thrushes”
...Show More Authors

In his opus, Ted Hughes has annexed new and fresh territories of signification to the very notion of the literary animal. Building on the earlier modernist example of the Lawrencian legacy that dwells upon the question of animalism, Hughes seems to have stepped further into the terrain of the sheer struggle when, in his hands, the grotesquerie of survival and violence energizes the topos of the literary animal in his postmodern bestiary. In Hughes’s elemental poetic process this grotesquerie and violence stages the literary animal as a vital poetic device or motif that is finally restored to the primitive power of poetry. In his “Thrushes”, he thus defamiliarizes these tiny creatures’ acts of being to bring upfront into focus thi

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Dec 13 2023
Journal Name
2023 3rd International Conference On Intelligent Cybernetics Technology &amp; Applications (icicyta)
GPT-4 versus Bard and Bing: LLMs for Fake Image Detection
...Show More Authors

The recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (4)
Scopus Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Saudi Medical Journal
Relationship between human leukocyte antigen DRB1 and psoriasis in Iraqi patients
...Show More Authors

View Publication
Scopus (4)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Aug 10 2020
Journal Name
Journal Of Petroleum Exploration And Production Technology
Geomechanical modelling and two-way coupling simulation for carbonate gas reservoir
...Show More Authors
Abstract<p>Geomechanical modelling and simulation are introduced to accurately determine the combined effects of hydrocarbon production and changes in rock properties due to geomechanical effects. The reservoir geomechanical model is concerned with stress-related issues and rock failure in compression, shear, and tension induced by reservoir pore pressure changes due to reservoir depletion. In this paper, a rock mechanical model is constructed in geomechanical mode, and reservoir geomechanics simulations are run for a carbonate gas reservoir. The study begins with assessment of the data, construction of 1D rock mechanical models along the well trajectory, the generation of a 3D mechanical earth model, and runni</p> ... Show More
View Publication
Scopus (15)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
Psychological Pollution in Iraqi Society and its Relationship With some Variables
...Show More Authors

The research aims to identify the level of psychological pollution in Iraqi society and the significant differences in psychological pollution in the Iraqi society according to variables. A sample of (600) individuals randomly selected from all governorates of Iraq, with (285) males and (315) females was used in the current study. The researcher adopted the scale of (Muhammad, 2004) psychological pollution consisting of (118) items, which limited (46) items after modification distributed into four areas: denial and abuse of the civilized identity, attachment to foreign formal aspects, effeminacy, and anarchism. The results of the research showed that there is no statistical significance among the individuals of the research sample. They

... Show More
View Publication Preview PDF