Preferred Language
Articles
/
jcolang-156
A Stylistic Analysis of Two Selected, English and Arabic, War Poems
...Show More Authors

War as a human phenomenon, has its own literature. Poetry is a major genre in this literature. This paper is an attempt to investigate and analyse some stylistic features in two selected, English and Arabic, war poems. These poems share the same theme.Both promote the principle of sacrificing one’s own life for the sake of homeland.  This paper limits itself to analyse, thecontent words, tenses, semantic grouping of vocabulary and foregrounding in the two poems. The areas of analysis show great similarities in distributing the general content words (nouns, verbs, adjectives, and adverbs). In the analysis of the semantic areas of each content word, these poems reveal some similarities and some differences in their frequency rates. The poets, in both poems, resort to the present tense to express their thoughts.Bothpoems demonstrate foregrounding, though in different degrees, in using repetition, deviation and parallelism.The sole significant difference is in the frequency use of adjectives, which is higher in the English poem than in the Arabic poem.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
Removing of Hexavalent Chromium from Aqueous Solutions Using Dried Yogurt, and Studying Isotherm, Kinetic and Thermodynamic Parameters
...Show More Authors

     In this study, Yogurt was dried and milled, then shaked with distilled water to remove the soluble materials, then again dried and milled. Batch experiments were carried out to remove hexavalent chromium from aqueous solutions. Different parameters were optimized such as amount of adsorbent, treatment time, pH and concentration of adsorbate. The concentrations of Cr6+ in solutions are determined by UV-Visible spectrophotometer.  Maximum percentage removal of Cr6+ was 82% at pH 2. Two equilibrium adsorption isotherms mechanisms are tested Langmuir and Freundlich, the results showed that the isotherm obeyed to Freundlich isotherm. Kinetic models were applied to the adsorption of Cr6+ ions on the adsorbents, ps

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of The College Of Languages (jcl)
Colonization and Civilization in Aimé Cesaire’s A Tempest
...Show More Authors

This study deals with the concepts of Colonialism and Civilization in Aimé Cesaire’s A Tempest. The concern of this study is to discuss how postcolonial writers are continually re-writing the Western canonical works as a reaction to the European cultural hegemony. The Western representations of the black are products of specific moments and developments in history and culture. A Tempest reflects a certain historical moment in the decolonization process.

A Tempest is analysed to reveal the counter literary strategy used by Aimé Cesaire, and to disclose the reasons why re-writing and writing back are considered as vital and inescapable tasks. Shakespeare’s The Tempest, which deals with the

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 31 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
Face mask detection methods and techniques: A review
...Show More Authors

Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m

... Show More
View Publication
Publication Date
Fri Jun 18 2004
Journal Name
Iraqi Journal Of Laser
Quantum Cryptography and a Quantum Key Distribution Protocol
...Show More Authors

In this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.

View Publication Preview PDF
Publication Date
Tue Aug 02 2022
Journal Name
Journal Of Legal Sciences
Judicial Precedent and Its Controls – A Comparative Study
...Show More Authors

Judicial jurisprudence is one of the important legal solutions to address the shortcomings of legislation. Throughout its long history, human societies have known many cases in which the judge finds himself facing a legislative vacuum in addition to civil legal texts that are difficult for the judge to implement due to ambiguity or contradiction, which requires diligence. To rule on resolving disputes before him in order not to deny justice, but the judge in his jurisprudence was not absolute, but rather bound by certain controls represented by observing the wisdom of legislation on the one hand and taking into account the nature of the texts on the other side, and from here this research came to shed light on the jurisprudence and its cont

... Show More
View Publication
Publication Date
Sun Jan 02 2022
Journal Name
Advances In Science And Technology Research Journal
Vein Biometric Recognition Methods and Systems: A Review
...Show More Authors

View Publication
Scopus (16)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2009
Journal Name
Journal Of The College Of Languages (jcl)
Graphic Novels : A Privilege For Teachers and Students
...Show More Authors

There are many ways to communicate a story, one can tell it, sing it, act it, write it, film it and can draw it. Each form of storytelling has its unique characteristics that separate it from the other forms. These distinguishing characteristics of each form does not indicate the superiority of one form over the other, on the contrary, it indicates the human ability to be creative on many levels. As students of literature, only the written form of a story is taken into account. One reason for the negligence of other forms of storytelling might be that singing and filming a story is not related to literature. But there has been a form of storytelling that uses words along with pictures which eventually became a genre of novels called grap

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Tools for Drought Identification and Assessment: A Review
...Show More Authors

Drought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought.  The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data.  The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Isolation and Identification of Polyethylene Terephthalate Degrading Bacteria from Shatt Al-Arab and Sewage Water of Basrah City
...Show More Authors

Biodegradation is utilizing microorganisms to degrade materials into products that are safe for the
environment, such as carbon dioxide, water, and biomass. The current study aims to isolate and characterize
bacteria with polyethylene terephthalate (PET) degradation ability isolated from Shatt al-Arab water and
sewage from Basra, the bacteria were identified as Klebsiella pneumonia. According to the findings, the
isolates showed a highly significant difference in degradation of PET (24% during 7 days) and the percent of
degradation increased to 46% at 4 weeks compared to the control. The study also involved determining the
optimum temperature of K. pneumonia growth, which was 37°C, while the preferred

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref