Preferred Language
Articles
/
jcolang-711
Dimension feminine in The Respectful Prostitute’s Jean- Paul Sartre and The Blind Prostitute’s Badr Shaker al-Sayyabe: La dimension féminine dans La P….respectueuse de Jean-Paul Sartre et La Prostituée Aveugle de Badr Shaker al-Sayyabe
...Show More Authors

      Jean-Paul Sartre and Badr Shakir al-Sayyabe are among the most prominent writers that critiqued the destructive role of capitalism and the patriarchal power system in the period of the Post-World War II crisis. Divided into three chapters, the present study examines two of the most eminent literary works in the history of the Western and Eastern societies in the fifties of the last decade: Jean Paul Sartre’s play : The Respectful Prostitute and Badr Shaker al-Sayyabe’s poem: The Blind Prostitute.

       Chapter one discusses the position of the prostitute in a patriarchal societies. Chapter two linguistically analyzes the prostitute’s behavior with men and evaluates the nature of a relationship when based on profit and loss. Such a relationship exposes the male dominance system on this social level through stigmatizing, marginalizing and depriving of her family establishing rights. Chapter Three sheds light on the prostitute’s ego and the other. In the two works, the society double standard is presented in dealing with status of a woman, rather than a man, as a prostitute, something that leads to uncover the individuality of such a character. Thus, and in addition to justly picturing prostitution as a human setback in all the western and Eastern societies, Sartre and al – Sayyab succeed in visualizing humanity decay within the perspective of the preceding decades.

Résumé

 Jean-Paul Sartre et Badr Shakir al-Sayyabe font partie des écrivains qui ont contribué à travers leurs œuvres à critiquer le système capitaliste et la société masculine dans la période de l'après-guerre. En lisant les deux ouvrages, nous avons choisi comme sujet commun de cette étude d'analyser le statut de prostituée dans les sociétés orientale et occidentale au cours des années 1950 du siècle dernier. L'étude est divisée en trois chapitres :

Le premier chapitre est basé sur la présentation du statut de la prostituée dans les communautés masculines des deux auteurs. Le deuxième chapitre analyse linguistiquement le comportement de la prostituée envers les hommes et la nature de la relation basée sur le principe du profit ou de la perte. Cette relation met d'abord en évidence la domination du système masculin sur cette partie social, le problème de la stigmatisation sociale, de la marginalisation et de la privation de son droit d'avoir et de fonder une famille. Le troisième chapitre traite la position de la prostituée entre le moi et l'autre. Dans les deux œuvres, le point de vue de la société semble être un double standard dans la condamnation de la femme comme prostituée plutôt que comme homme. Ce mécanisme nous amène à retrouver l'identité de la prostituée. Nous arrivons à conclure que le succès de Sartre et d'al-Sayyabe en présentant cette profession comme un échec humain pour les sociétés orientales et occidentales et la décadence de l'homme ou de la femme et en les dépeignant avec une perspective qui correspond aux crises du siècle dernier.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Financial investment strategies – Conceptual Framework
...Show More Authors

The investor needs to a clear strategy for the purpose of access to the financial market, that is, has a plan to increase The share of the profits thinking entrepreneur and new, and highlights the importance of this in that it sets for the investor when it goes to the market, and when it comes out of it, and at what price to buy or sell the stock, and what is the the amount of money it starts. Fortunately, he does not need to invent his own investment strategy, because over the years the development of effective methods of buying and selling, and once you understand how to work these methods investor can choose the most appropriate methods and adapted image that fit his style investment .

  &nb

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Data Mining Techniques for Iraqi Biochemical Dataset Analysis
...Show More Authors

This research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Al-kindy College Medical Journal
Viable Strategies to Increase Clinical Trial Patient Diversity
...Show More Authors

In the United States, the pharmaceutical industry is actively devising strategies to improve the diversity of clinical trial participants. These efforts stem from a plethora of evidence indicating that various ethnic groups respond differently to a given treatment. Thus, increasing the diversity of trial participants would not only provide more robust and representative trial data but also lead to safer and more effective therapies. Further diversifying trial participants appear straightforward, but it is a complex process requiring feedback from multiple stakeholders such as pharmaceutical sponsors, regulators, community leaders, and research sites. Therefore, the objective of this paper is to describe three viable strategies that can p

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Sep 25 2025
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Theoretical Study of Thermal Cracking For Acenaphthylene Molecule
...Show More Authors

Density Functional Theory (DFT) calculations were carried out to study the thermal cracking for acenaphthylene molecule to estimate the bond energies for breaking C8b-C5a , C5a-C5 , C5-C4 , and C5-H5 bonds as well as the activation energies. It was found that for C8b-C5a , C5-C4 , and C5-H5 reactions it is often possible to identify one pathway for bond breakage through the singlet or triplet states. The atomic charges , dipole moment and nuclear – nuclear repulsion energy supported the breakage bond .Also, it was found that the activation energy value for C5-H5 bond breakage is lower than that required for C8b-C5a , C5a-C5 , C5-C4 bonds which refer to C5-H5 bond in acenaphthylene molecule are weaker than C8b-C5a , C5a-C5 , C5-C

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
Some Results on Pure Submodules Relative to Submodule
...Show More Authors

Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be pure relative to submodule T of M (Simply T-pure) if for each ideal A of R, N?AM=AN+T?(N?AM). In this paper, the properties of the following concepts were studied: Pure essential submodules relative to submodule T of M (Simply T-pure essential),Pure closed submodules relative to submodule T of M (Simply T-pure closed) and relative pure complement submodule relative to submodule T of M (Simply T-pure complement) and T-purely extending. We prove that; Let M be a T-purely extending module and let N be a T-pure submodule of M. If M has the T-PIP, then N is T-purely extending.

View Publication Preview PDF
Crossref
Publication Date
Fri Feb 28 2025
Journal Name
Journal Européen Des Systèmes Automatisés
Decision-Making Model for Aircraft Landing Based on Fuzzy Logic Approach
...Show More Authors

An aircraft's landing stage involves inherent hazards and problems associated with many factors, such as weather, runway conditions, pilot experiences, etc. The pilot is responsible for selecting the proper landing procedure based on information provided by the landing console operator (LCO). Given the likelihood of human decisions due to errors and biases, creating an intelligent system becomes important to predict accurate decisions. This paper proposes the fuzzy logic method, which intends to handle the uncertainty and ambiguity inherent in the landing phase, providing intelligent decision support to the pilot while reducing the workload of the LCO. The fuzzy system, built using the Mamdani approach in MATLAB software, considers critical

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Iraqi Journal Of Science
On Semiannahilator Supplement Submodules
...Show More Authors

Let R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes

Publication Date
Sun Sep 04 2016
Journal Name
Baghdad Science Journal
Bioadsorption of Heavy Metals From Industrial Wastewater Using Some Species of Bacteria
...Show More Authors

Three isolated bacteria were examined to remove heavy metals from the industrial wastewater of the Diala State Company of Electrical Industries, Diyala-Iraq. The isolated bacteria were identified as Pseudomonas aeruginosa, Escherichia coli and Sulfate Reducing Bacteria (SRB). The three isolates were used as an adsorption factor for different concentrations of Lead and Copper (100, 150, and 200 ppm.), in order to examine the adsorption efficiency of these isolates. In addition, the effect of three factors on heavy metals adsorption were examined; temperature (25, 30, and 37 ?C), pH (3 and 4.5) and contact time (2 and 24 hrs). The results showed that the highest level of lead adsorption was obtained at 37 ?C by E. coli, P, aerugenosa and

... Show More
View Publication Preview PDF
Crossref (5)
Crossref