Preferred Language
Articles
/
jcolang-549
NEW PERSPECTIVES ON SHAKESPEAR'S "THE TEMPEST"
...Show More Authors

This paper is mainly concerned with the study of the moral aspects that prompts William Shakespeare to attempt a romance in which he has embedded the epitome of his thought, experience, and philosophy concerning certain significant aspects of human life whose absence or negligence may threaten human existence, peace, and stability. From the beginning of history man realizes the importance of prosperity on the many and various levels that touch and address his needs and desires—natural, material, and spiritual. The Tempest, due to the dramatist's awareness of the aforementioned values, reflects the dramatist's duty as to projecting and unfolding these important aspects, reconciliation and forgiveness, that promote prosperity which is the most significant factor that is to preserve human life in this universe.
The Tempest is considered one of William Shakespeare's successful plays. This is an attempt to analyze in details the background of the play with a view to relating it to the times during which it was written and to the main motives that prompted Shakespeare to write it. It has been pointed out that the play was written as a masque whose main aim was to present in an honourable way the concept of marriage in a celebration to a refined society. The Tempest is a short play written for a court performance to be acted before King James II on Hollowness night,1st November 1611and it was presented once more in the late 1612 or the early 1613, in connection of the marriage of Princess Elizabeth with the Prince Palatine Elector. The significance of the performance of this play in particular on such an occasion as the marriage lies in the fact that that marriage is symbolic of the marriage of Ferdinand and Miranda, two major characters in the play, which is regarded as a sound and very important social institution which does not only contribute to the construction of society, but also results in all signs of prosperity and happiness.
Before going deep into the moral implications contained in the play it must be noted that

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Shot Peening Time Effect on Corrosion Behaviors of Al Alloy 2024-T3
...Show More Authors

In this study many specimen s were prepared from 2024-T3 Aluminum alloy for corrosion test by the dimensions of (15*15*3) mm according to ASTM G71-31 and then subjected to shot peening process at different time (15, 30, 45) minutes using steel ball having a diameter of 2.75 mm and Rockwell Hardness of 55RC to induce compressive residual stress which were measured using X-Ray diffraction method, surface roughness and   hardness were tested before and after peening. Electrochemical corrosion test by Tafel extrapolation method was carried out in an environment of 3 .5% NaCl solutions (sea water) where Corrosion rate calculated using Tafle equation.

The obtained results show a favorable influence of SP treatment

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 04 2018
Journal Name
Al-khwarizmi Engineering Journal
Effect of Carburization Parameters on Hardness of Carburized Steel Using MOORA Approach
...Show More Authors

In this research, (MOORA) approach based– Taguchi design was used to convert the multi-performance problem into a single-performance problem for nine experiments which built (Taguchi (L9) orthogonal array) for carburization operation. The main variables that had a great effect on carburizing operation are carburization temperature (oC), carburization time (hrs.) and tempering temperature (oC). This study was also focused on calculating the amount of carbon penetration, the value of hardness and optimal values obtained during the optimization by Taguchi approach and MOORA method for multiple parameters. In this study, the carburization process was done in temperature between (850 to 950 ᵒC) for 2 to 6

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Sep 15 2019
Journal Name
Al-academy
Consumer Subjective Values and their Reflection on Fashion Design: وسن خليل إبراهيم
...Show More Authors

This paper deals with the subjective reflections of consumer values ​​on fashion design. The   consumer self is determined by the consumer's idea of ​​himself, according to the intellectual, spiritual and social values, and these values ​​take their intellectual reflection in the form of material values ​​that the consumer finds in fashion design. These values ​​are based on considerations between what is intellectual represented by the values ​​of the consumer, and what is material determined by the fashion design, which also proceed from values that are visible or implied in costume design, such as the function, beauty and symbol. The   consumer self gets its material image represented in the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Solar ray tracing programs to find new types of solar
...Show More Authors

Anew Solar concentrator have been designed in this paper, this concentrators Were based on the total internal reflection in a prism, the prism angles has been calculated by depending on the solar incident ray angle in baghdad for a year. The optical design consist ofa triangular presume, Where the solar cells on one side of the prism Wh?le the prism head towered the south. The results show that there is an increasing in the solar ray concentrators and the cell area is reduced.

View Publication Preview PDF
Publication Date
Mon Dec 01 2014
Journal Name
Ain Shams University
New Studies for Topological Generalizations and Uncertainty in Graph Theory
...Show More Authors

Topology and its applications occupy the interest of many researching centers in the advanced world. From this point of view and because the near open sets play a very important role in general topology and they are now the research topics of many topologists worldwide and its sets doesn’t enter in fibrewise topology yet. Therefore, we use some of the near open sets to be model for introduce results and new spaces in fibrewise topological spaces. Also, there is a very important role of closure operators in constructing a topological spaces, so we introduce a new closure operators on the power set of vertices on graphs and conclusion theorems and new spaces from it. Furthermore, we discuss the relationships of connectedness between some ty

... Show More
Preview PDF
Publication Date
Sat Mar 04 2006
Journal Name
Iraqi National Journal Of Chemistry
Synthesis a new series of azo compounds containing oxadiazole rings
...Show More Authors

Some new 2,5-disubsituted-1,3,4-oxadiazole derivatives with azo group were synthesized by known reactions sequence . The structure of the synthesized compounds were confirmed by physical and spectral means .

Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
Synthesis of Some New 1,2,4-Triazoles Derived from 2-Mercaptobenzimidazole
...Show More Authors

New 1,2,4-triazole derivatives of 2-mercaptobenzimidazole (MB) are reported. Ethyl (benzimidazole-2-yl thio) acetate (1) has been prepared by condensing 2-mercaptobenzimidazole with ethylchloroacetate. The ester (1) on reacting with hydrazine hydrate gave the corresponding acetohydrazide(2)which was reacted separately with phenylisocyanate and phenylisothiocyanate, followed by ring closure in an alkaline medium giving 3-[(benzimidazole-2-yl thio) methyl]-4-phenyl-1,2,4-triazole-5-ol and 3-[(benzimidazole-2-yl thio) methyl]-4-phenyl-1,2,4-triazole-5-thiol respectively (6,7). Reaction of acetohydrazide (2) with CS2 and ethanol/KOH, gave dithiocarbazate salt (8). Cyclization of (8) with hydrazine hydrate gave 3-[(benzimi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 13 2023
Journal Name
Corrosion And Protection
NEW THERMOTROPIC SYMMETRICAL MESOGENS CONTAINING HETERO RINGS: SYNTHESIS AND CHARACTERIZATION
...Show More Authors

A variety of liquid crystals comprising heterocyclics 1,3,4-oxadiazol ring [III], aminooxazol [IV]a, and aminothiazol [IV]b were synthesized through a number of steps, beginning of the reaction of 3, 3'- dimethyl - [1, 1'-biphenyl] -4, 4'- diamin, ethyl monochloroacetate and sodium acetate to synthesize diacetate compound[I]. The diester reacted with hydrazine hydrate(N2H4-H2O) to give dihydrazide compound [II], then reacted with Pyruvic acid and phosphorous oxychloride to produce diketone compound [III]. The last compound was reacted with urea and thiourea to give aminooxazol and aminothiazol respectively. The synthesized compounds actually characterized and determined the structures by melting points, FT-IR and 1H-NMR spectroscopies. By u

... Show More
Preview PDF
Publication Date
Fri Sep 05 2008
Journal Name
Journal Of Kerbala University
Synthesis of New type of tetrazoles starting from D-ribose
...Show More Authors

This work includes synthesis of sugar tetrazole derivative, D-ribose reacted with acetone in the presence of sulfuric acid H2SO4 to give 2, 3-O-isopropylidene-D-ribose (1). The Aldol condensation of (1) with formaldehyde in methanolic K2CO3 solution gave 2-hydroxymethyl (2, 3-O-isopropylidene-D-ribose)(2). Which was tosylated by Tosyl chloride in pyridine to yield compound (3), SN2 reaction of (3) with sodium cyanide in DMSO afforded compound (4). The [2+ 3] cycloaddition reaction of (4) with sodium azide gave the targeted compound (5). All prepared compounds have been characterized by: TLC, Specific rotation, Microelemental analysis and [FTIR and 1 H NMR spectroscopy]

Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref