Preferred Language
Articles
/
jcoeduw-1131
The Female Characters In The Pre-Raphaelite Novel: M.E. Braddon’s Lady Audley’s Secret (An Extracted Research of Master Degree Letter)
...Show More Authors

Victorian age is known as a time of perpetual change. It is a time of new industrialization, increased urbanization and new technology. Therefore, one of the strongest undercurrents of this is the position of women. Woman at that time was viewed as “an angel in the house” especially this who belongs to the upper-middle class. She is described in such term because she spends much time in her domestic domain. Therefore, she should be passive, obedient and dependent. Despite the Victorian society contains several classes; women are defined under two labels: the angel and the demon or the whore. The angel woman can be any woman from the lower middle class to the aristocracy, while the whore refers to any working class woman. The difference between the two is that the second type has to work outside to earn the living. Living in a patriarchal society, both types of women are oppressed. The first type, the angel, should not have the right to be independent or even to make any choice and if she does, she will be mad, dangerous and demon, while the second type is considered rebellious and whore for being seen among the outsiders. Thus and as result, both of them are mistreated as outcasts. The Pre-Raphaelite writers are daring and so interested in the issue of woman because of the reasons mentioned above. One of them is Mary Elizabeth Braddon. In her novel, Lady Audley’s Secret, she tries to show the position of women and the Victorian attitudes towards them through the symbol of the characters especially the female characters. There are no much details about them in the novel because they are used as symbol to bring the attention of the readers to social and moral problems concerning the Age. This can be clearly seen in the character of Lady Audley. She stands for the threatening woman who tries to make a change in a patriarchal world. The female characters in the novel represent the fear of women’s independence. Lady Audley is considered a devilish and dangerous woman and should be buried alive in an asylum because she violates the prevailing traditions. She portrays the fears of many people in the patriarchal society including even the women as Alicia, Phoebe, and Clara. Lady Audley shows that even those women, who are obedient, are oppressed by the severe society. They are the victims of the filial and marital power. 

Concerning classes, Lady Audley shows that it is a crime for the lower class to intrude high class. They are considered criminal and deserve punishment while the high class has the authority to do anything. Because Lady Audly intrudes the upper class by marrying Sir Michael, she is considered a criminal. Lady Audly is not a mere character. She is a new heroine and representative because she stands for all female characters who try to make changes in a patriarchalworld.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 26 2023
Journal Name
International Journal Of Environment And Waste Management
Novel Poly (3-hydroxybutyrate) production using Bacillus subtilis NG220 and watermelon derived substrates
...Show More Authors

Poly (3-hydroxybutyrate) (PHB) is a typical microbial bio-polyester reserve material; known as “green plastics”, which produced under controlled conditions as intracellular products of the secondary metabolism of diverse gram-negative/positive bacteria and various extremophiles archaea. Although PHB has properties allowing being very attractive, it is too expensive to compete with conventional and non-biodegradable plastics. Feasibility of this research to evaluate the suitability of using a watermelon-derived media as an alternative substrate for PHB synthesis under stress conditions was examined. Results, include the most nutrients extraction, indicated that the watermelon seeds contain a high content of nutrients makes them a promisi

... Show More
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Traitement Du Signal
Optimizing Acoustic Feature Selection for Estimating Speaker Traits: A Novel Threshold-Based Approach
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (25)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Role of Banking Marketing Strategies in achieving Competitive Advantage: Applicatory Research on a Sample of Iraqi Private Banks
...Show More Authors

The main purpose of this research aims to measure the role of banking strategies marketing in achieving competitive advantage within a sample of Iraqi private banks, and in order to achieve this purpose,  the researcher depend on number of sober research approaches which consisted of descriptive, analytical and practical methodologies, to strengthen concepts addressed by the research, size of the sample was (56) individuals which makes up the senior leadership represented (Chairman and members of the Board of Directors, Commissioners and their assistants and department heads) while the primary tool for research (questionnaire), which has been designed based on a number of solemn scientific metrics, after adapted these metrics commen

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 03 2020
Journal Name
Journal Of Public Affairs
Ethnographic research method for psychological and medical studies in light of COVID ‐19 pandemic outbreak: Theoretical approach
...Show More Authors

Ethnographic research is perhaps the most common applicable type of qualitative research method in psychology and medicine. In ethnography studies, the researcher immerses himself in the environment of participants to understand the cultures, challenges, motivations, and topics that arise between them by investigating the environment directly. This type of research method can last for a few days to a few years because it involves in-depth monitoring and data collection based on these foundations. For this reason, the findings of the current study stimuli the researchers in psychology and medicine to conduct studies by applying ethnographic research method to investigate the common cultural patterns language, thinking, beliefs, and behavior

... Show More
View Publication