African-American writers during the 19th century wrote in the shadow of the prominent romance, sentimental, and domestic fiction. Harriet Wilson’s Our Nig (1859) reflects an “alternative social character”, for the female protagonist suffers racism in the free North, because she is a mulatto child. Through depicting the life of free blacks, who supposedly lives a better life than Southern slaves, Wilson exposes how she has actually lived and sensed life in antebellum America. According to Raymond Williams (2011), there are two kinds of literary writings. The first represents the general tendency of the age, and he calls it “dominant social character”; representing the majority content of both the public writing and speaking. But, another different literary writing lives in its shadow; one that usually leads the conflicts of the time. It is the “alternative social character”; the literature of the victims of repression and marginalization, produced by the lower class, women, and blacks. They reflected how they were dehumanized, and exposed their suffering and abasement. They also aimed to prove individualism. The novel reveals how racism in the North could be worse than the slavery of the South. This paper shows Wilson deviation from the “her brethren” in writing her novel. It unveils significant truths concerning black women’s status in antebellum America. It discusses how the author attempts to correct certain misconceptions through her female character.
Wireless sensor networks (WSNs) are emerging in various application like military, area monitoring, health monitoring, industry monitoring and many more. The challenges of the successful WSN application are the energy consumption problem. since the small, portable batteries integrated into the sensor chips cannot be re-charged easily from an economical point of view. This work focusses on prolonging the network lifetime of WSNs by reducing and balancing energy consumption during routing process from hop number point of view. In this paper, performance simulation was done between two types of protocols LEACH that uses single hop path and MODLEACH that uses multi hop path by using Intel Care i3 CPU (2.13GHz) laptop with MATLAB (R2014a). Th
... Show MoreJurisprudential rulings were not once restricted to anyone. Even if some prominent imams were famous in one science, this does not mean that some of them were not very knowledgeable and well versed in another science, but he did not know much about it, given his fame in the first science in which he emerged. It prevailed over him until he became known only through him, and there are a large number of these people, and among them is our imam, the great critic Yahya bin Ma’in, may God be pleased with him. Many people, and even scholars, know about him except that he is the only imam in jarh and ta’deel, and on his words and the words of his strike are relied upon. In terms of the authenticity and weakness of the hadith, he is in this f
... Show MoreThe aim of the research is to determine the impact of evaluating the investment projects in the development and preparation of investment budgets prepared by the economic units, since the investment projects are of an important and vital nature of the economic units, because these projects include the length of time for preparation and implementation and the accompanying period of this risk and uncertainties as well as need To the many funds to complete the project , The process of evaluating the implemented projects, which have been prepared an investment budget previously will contribute to the extent of matching the estimated data with the actual results or deviations, which is a step to avoid these errors in future p
... Show MoreThe study aims to identify how to build the media message in an artistic design style (infographic) to reach the mechanism of building the media message by infographic in the researched news sites. For the survey method, which is one of the best methods used to study the subject of the research, the researcher used the method of content analysis, the employee of the research tool, a quantitative and qualitative content analysis form for the study of 74 infographics that appeared during the research period in the research sample sites. The study revealed a number of results, most notably 1. The surveyed sites employed the information in a manner based on images, shapes and data, that is, through the use of the visual element and the
... Show MoreCryptography is the technology of protecting information and communication by means of encoding the sending information. Existing methods often operate within predetermined mathematical structures which can be subject to pattern recognition and which are lack biological randomness. To address these challenges, this paper introduced a new bio-inspired cryptography approach to protect text messages using the coding mechanisms of DNA and RNA materials. The encryption system consists of six steps: encoding the plaintext message into DNA sequences, transcribing DNA into RNA, applying the complementary base pairing, scrambling RNA segments, optional reverse transcription, and encoding the resulting DNA-RNA characters into ciphertext. Rand
... Show MoreLearning a foreign language is a highly interactive process, and a belief that communicative activities foster a great amount of linguistic production provides language practice and opportunities for negotiation of meaning during communicative exchanges. Thus, this study examines what benefits learner-centered classroom setting offers compared with that of teacher–centered classroom, and how less proficient learners accomplish their tasks and activities with scaffolded help during interaction with the help of proficient classmates and under the guidance of a skilful person, i.e., the teacher. The subjects participating in this study are 30 Iraqi 4th year college students in the Department of English, College of Arts , Univer
... Show More