Preferred Language
Articles
/
fhcTVY4BVTCNdQwCA0Ku
Lingual Sovereignty: Chinua Achebe’s Novel Things Fall Apart A Postcolonial Study
...Show More Authors

The discourse surrounding lingual sovereignty within the African postcolonial context is profoundly intertwined with the fabric of cultural identity and self-determination. Language serves not merely as a conduit for communication but as a repository for a people's collective consciousness, encapsulating their traditions, thoughts, and perspectives. In the realm of postcolonial literature, this dialogue often grapples with the paradox of expressing indigenous narratives through the linguistic tools of former colonizers. Chinua Achebe's seminal work, "Things Fall Apart," exemplifies this conundrum, artfully weaving the orature and culture of Umuofia within the English language. Achebe's choice to write in English—a language imposed upon his native land through colonialism—does not diminish the sovereignty of his cultural expression. Instead, it serves as an act of subversion, repurposing the language to convey a narrative inherently African in its essence. This strategic use of English enables Achebe to reach a broader audience while simultaneously challenging imperialistic narratives. The novel stands as a testament to the fact that lingual sovereignty transcends the mere use of native tongues; it is embodied in the assertion of one's narrative and cultural truths, regardless of the medium.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 01 2012
Journal Name
Ijcsi International Journal Of Computer Science
Implementing a novel approach an convert audio compression to text coding via hybrid technique
...Show More Authors

Compression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio fil

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 21 2017
Journal Name
Biomechanics And Modeling In Mechanobiology
A novel method for non-invasively detecting the severity and location of aortic aneurysms
...Show More Authors

The influence of an aortic aneurysm on blood flow waveforms is well established, but how to exploit this link for diagnostic purposes still remains challenging. This work uses a combination of experimental and computational modelling to study how aneurysms of various size affect the waveforms. Experimental studies are carried out on fusiform-type aneurysm models, and a comparison of results with those from a one-dimensional fluid–structure interaction model shows close agreement. Further mathematical analysis of these results allows the definition of several indicators that characterize the impact of an aneurysm on waveforms. These indicators are then further studied in a computational model of a systemic blood flow network. This demonstr

... Show More
View Publication Preview PDF
Scopus (34)
Crossref (33)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Tue Sep 24 2024
Journal Name
Arab World English Journal
A Critical Discourse Analysis of Women’s Representation in Maysaloon Hadi’s Novel The Black Eyes
...Show More Authors

This study applies a discourse analysis framework to explore the portrayal of women in Maysloon Hadi’s novel (The Black Eyes) (2011), using Critical Discourse Analysis (CDA) and Norman Fairclough’s tri-dimensional model (1989) as the analytical foundation. It investigates the roles and challenges women face in the novel. While there is growing interest in the portrayal of women in literature, Iraqi literature—especially from the perspective of Iraqi women writers remains underexplored. Hadi’s *The Black Eyes* provides a unique case to examine this intersection. Despite the novel’s rich narrative, which offers insight into Iraqi women’s lives, there is a lack of comprehensive CDA to understand how its language constructs

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri Jul 31 2020
Journal Name
Lark Journal For Philosophy, Linguistics And Social Sciences
Identity crisis of Arab-American in Laila Halaby's Novel once in a promise Land
...Show More Authors

This study aims at describing the identity crisis of Diaspora people (Arab -American) in "Laila Halaby's" novel "Once in A promise Land". Halaby tackles the issues of racism, exclusion, and instability of identity that affect the Arab American community after the terrorist event of eleventh of September. She sheds light on the experiences of her significant characters Salwa and Jassim in America, clarifying how this event weakened their social position and turns their presence in America questionable. "Halaby" describes the bitterness of her characters who are induced into a dream of belonging to a land that transcends their original culture and religious values as well as their language. "Halaby" explains the subsistence in America involvi

... Show More
View Publication
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sun Sep 03 2023
Journal Name
Wireless Personal Communications
Application of Healthcare Management Technologies for COVID-19 Pandemic Using Internet of Things and Machine Learning Algorithms
...Show More Authors

View Publication
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (19)
Crossref (10)
Scopus Crossref
Publication Date
Tue Aug 23 2022
Journal Name
Frontiers In Energy Research
Evaluation of T-Shaped Fins With a Novel Layout for Improved Melting in a Triple-Tube Heat Storage System
...Show More Authors

The effects of T-shaped fins on the improvement of phase change materials (PCM) melting are numerically investigated in vertical triple-tube storage containment. The PCM is held in the middle pipe of a triple-pipe heat exchanger while the heat transfer fluid flows through the internal and external pipes. The dimension effects of the T-shaped fins on the melting process of the PCM are investigated to determine the optimum case. Results indicate that while using T-shaped fins improves the melting performance of the PCM, the improvement potential is mainly governed by the fin’s body rather than the head. Hence, the proposed T-shaped fin did not noticeably improve melting at the bottom of the PCM domain; additionally, a flat fin is ad

... Show More
View Publication
Scopus (44)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Sat Oct 03 2020
Journal Name
International Journal Of Pharmaceutical Research
Serum Afamin As A Novel Biomarker for NonAlcoholic Fatty Liver Disease as A Complication of Hypothyroidism in Iraqi Patients.
...Show More Authors

Afamin, which is a human plasma glycoprotein, a putative multifunctional transporter of hydrophobic molecules and a marker for metabolic syndrome. Afamin concentration have been proposed to have a significant role as a predictor of metabolic disorders. Since NAFLD is associated with metabolic risk factors, e.g., dyslipidemia, insulin resistance and visceral obesity, it is considered as the hepatic manifestation of the metabolic syndrome. The objective of this study is to determine Afamin levels in hypothyroid patients with and without fatty liver disease and compare the results with controls. Also to study the relationship of Afamin level with the Anthropometric and Clinical Features (Age, Gender, BMI and Duration of Hypothyroidism) , Serum

... Show More