Although the concept of difference is as old as the foundational concept of similarity, the modern (and contemporary) understanding of difference as a working notion that not only differentiates, but also approximates conflicting elements in an all encompassing system owes a great deal to the German philosopher Georg Wilhelm Friedrich Hegel (1770-1831). An idealist to the backbone, Hegel bequeathed to modern philosophy the postulation that the identity of an individual rests not in itself but in the relationship that individual‟s identity entertains with other members of society. In his classic Phenomenology of Spirit, Hegel explains how humans come to consciousness (pivotal concept in Idealism) through a strenuous, albeit apparently intuitive, process which he calls “the dialectic” that he exemplifies in the famous Master-Slave dialectic.1
Hegel assumes that humans are not born with an independent, formative consciousness, but, on the contrary, they aspire to acquire self-consciousness when the self (which Hegel alternatively calls “being-for-self”) is acknowledged and recognized by other fellows—an arduous, but imperative, dynamic that Hegel terms “being-for-others.” Self-consciousness is attained only after the self
104
undergoes painstaking “stages” involved in the system of human relationships, which is representative of the Hegelian dialectic. This all-encompassing, ever changing system holistically places the individual “self” in relation to other “selves” while itself remains in constant motion. Accordingly, meaning and truth are never determinately fixed because they are always in process since, says Hegel, “the action has a double significance not only because it is directed against itself as well as against the other, but also because it is indivisibly the action of one as well as of the other.”2
The application of the test case prioritization method is a key part of system testing intended to think it through and sort out the issues early in the development stage. Traditional prioritization techniques frequently fail to take into account the complexities of big-scale test suites, growing systems and time constraints, therefore cannot fully fix this problem. The proposed study here will deal with a meta-heuristic hybrid method that focuses on addressing the challenges of the modern time. The strategy utilizes genetic algorithms alongside a black hole as a means to create a smooth tradeoff between exploring numerous possibilities and exploiting the best one. The proposed hybrid algorithm of genetic black hole (HGBH) uses the
... Show MoreUrban land uses are in a dynamic state that varies over time, the city of Karbala in Iraq has experienced functional changes over the past 100 years, as the city is characterized by the presence of significant tourist and socio-economic activity represented by religious tourism, and it occur due to various reasons such as urbanization. The purpose of this study is to apply a Markov model to analyze and predict the behavior of transforming the use of land in Karbala city over time. This can include the conversion of agricultural land, or other areas into residential, commercial, industrial land uses. The process of urbanization is typically driven by population growth, economic development, based on a set of probabilities and transitions bet
... Show MoreIn this work, polyvinylpyrrolidone (PVP)/ Multi-walled carbon nanotubes (MWCNTs) nanocomposites were prepared with two concentrations of MWCNTs by casting method. Morphological, structural characteristics and electrical properties were investigated. The state of MWCNTs dispersion in a PVP matrix was indicated by Field Effect-Scanning Electron Microscopy (FESEM) which showed a uniform dispersion of MWCNTs within the PVP matrix. X-ray Diffraction (XRD) indicate strong bonding of carbonyl groups of PVP composite chains with MWCNTs. Fourier transfer infrared (FTIR) studies shows characteristics of various stretching and bending vibration bands, as well as shifts in some band locations and intensity changes in others. Hall effect was stu
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreThree new hydrazone derivatives of Etodolac were synthesized and evaluated for their anti-inflammatory activity by using egg white induced paw edema method. All the synthesized target compounds were characterized by CHN- microanalysis, FT-IR spectroscopy, and 1HNMR analysis. The synthesis of the target (P1-P3) compounds was accomplished following multistep reaction procedures. The synthesized target compounds were found to be active in reducing paw edema thickness and their anti-inflammatory effect was comparable to that of the standard (Etodolac).
This study is conducted in order to, investigate the trophic state of Duhok Lake Dam located within Duhok city, Iraq. Water samples are collected seasonally from three monitored sites during 2011. The parameters used for assessing water quality and trophic status level include: water temperature, pH, EC, TDS, DO, BOD5, nutrients, Secchi disk transparency, and chlorophyll a. The results reveal that DO is above 5 mg.l-1 in all sites, BOD5 value is within permissible level for domestic uses. Water quality considered as a hard type. High sulfate concentration is recorded during the study period. Trophic state shows that water type is classified as mesotrophic during autumn season, while it is regarded as eutrophic in other seasons. TDN/TDP rati
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show More