Search or add a thesis

Advanced Search (Beta)
Home > Magical Realism and Social Protest in the Works of Gabriel García Márquez

Magical Realism and Social Protest in the Works of Gabriel García Márquez

Thesis Info

Access Option

External Link

Author

Mustanir Ahmad

Supervisor

Ayaz Afsar

Program

PhD

Institute

International Islamic University

City

Islamabad

Province

Islamabad.

Country

Pakistan

Thesis Completing Year

2015

Thesis Completion Status

Completed

Subject

English Language & Literature

Language

English

Link

http://prr.hec.gov.pk/jspui/bitstream/123456789/6776/1/Mustanir_Ahmad_English_IIU_2015.pdf

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676724847913

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


The technique of magical realism is relevant to the postcolonial reality and the subsequent voice of protest raised against the ways in which (post)colonialism has told upon the politico-social and cultural economy of the (previously-)colonized nations. Labelled as subversive, hybrid and mestizo, magical realism has been noted to be a significant tool of social protest. However, the effectiveness of the relationship between magical realism and social protest, with reference to the works of García Márquez, have not been focus of a detailed scholarship. The present thesis explores how and in what ways magical realism has been helpful to García Márquez in registering protest against exploitation, which is a major form of social injustice. His recourse in magical realism has a definite and visible political edge and his work not only does make the reader question the so-called absolute nature of the real, but also reviews the borders of an unconsciously politicised ideology that (de-)shapes the very structure of his worldview. This thematic research is an effort to demonstrate that García Márquez’s fiction has overt political implications along with an undertone of protest against social injustice. He achieves the desired intensity of protest by the means of magical realism, in which he incorporates and juxtaposes various elements derived from disparate sources, e.g. oral/folklore culture, myth, and stereotypes. To ultimately bring forth and enhance the themes, the disparity of sources is manifested in the very structure of his fiction and is further strengthened by an essentially carnivalesque language founded on hyperbole, humour, and irony. It has been generalised that it is on the basis of these textual features that a magical realist text is able to challenge Western epistemology, proving the socalled rational as inconsistent and arbitrary in all respects.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

سراج منیر

سراج منیر
لاہور سے پروفیسر محمد اسلم، صدر شعبہ تاریخ، پنجاب یونیورسٹی نے اطلاع دی ہے کہ ادارۂ ثقافت اسلامی کے سربراہ اور المعارف کے مدیر اعلیٰ جناب سراج منیر اچانک حرکتِ قلب بند ہوجانے سے انتقال کرگئے، اﷲ تعالیٰ ادارہ کو ان کا نعم البدل عطا کرے اور مرحوم کی مغفرت فرمائے ، دارالمصنفین ان کے اعزہ و ادارہ ٔ ثقافت کے غم میں برابر کا شریک ہے۔ (ضیاء الدین اصلاحی، اکتوبر ۱۹۹۰ء)

الله وصفاته في سفر التكوين من التوراة

ABSTRACT The book of Genesis has comprehensive details about Prophets like Noah, Abraham, Jacob and Joseph. A greater portion of Genesis deals with Jacob and his sons like Joseph(A. S) . It narrates and explicates how Almighty Allah-the supreme creator - is different from his creations including the Mighty Prophets. Hereby a selection of appropriate textual references is streamlined from Genesis in an effort to show that Almighty Allah transcends all-being a Mighty Creator- and how it negates the concept of trinity in itself

Hardware Intrusion Detection Using Run-Time Parametric Analysis

The advancements in electronic systems and technology miniaturization have revolutionized the world in the last couple of decades. The higher complex ity of modern designs, economic constraints, and unprecedented pressure of time-to-market dictate the rationale of Integrated Circuit (IC) manufacturing from the third-party fabrication facilities. This rising trend of globalization in circuit design using nanoscale process technologies has increased their vulner ability against malicious intrusions and modifications. Such modifications, also referred as Hardware Trojans (HTs), can lead to highly detrimental con sequences like causing a circuit to subvert normal operation, leak sensitive information or inducing Denial of Service (DoS). These emerging issues are imposing formidable threats to security-critical applications particularly in the domains of military, communications, and Internet of Things (IoT). The conventional side channel analysis-based HT detection techniques mostly rely on simulations, which are typically exhaustive and computationally intensive. Moreover, it takes substantial resources and time for all-encompassing veri fication and analysis of the circuits. In this thesis, we apply the strengths of formal verification to complement simulation-based HT detection techniques by detailed behavioral analysis of circuits at the early stage of design. Formal methods are conclusive and well-established techniques which are used for description of complex sys vi vii tems in the form of mathematical models, and then use those models for rigorous analysis. In particular, we present a model checking-based formal framework that is broadly used to: (i) mathematically model an individual circuit for its functional and behavioral verification; (ii) analyze and quan tify vulnerability of a region in circuit against different types of HTs using multiple side-channel parameters; and (iii) identification of secure bounds for circuit operations in terms of its side-channel parameters. The outcome of the formal framework is used to design side channel-based sensor that comprehends the behavior of the circuit using a machine learning technique while incorporating the impacts of random process variations. The proposed framework serves to achieve the primary thesis goal of implanting intelligent sensor leveraging rigorous a-priori assessment of IC characteristics. The im plemented sensor can be subsequently used for post deployment identification of the HT-infected IC. To illustrate the practical effectiveness of the proposed infrastructure, we present the detailed analysis of multiple benchmark circuits. The formal framework and automated analysis technique, formulated during this thesis, proved effective in examining the impacts of malicious intrusions on multi ple side-channel parameters. Moreover, it provides flexibility in identifying the appropriate sensing units to incorporate security in the circuits while minimizing additional hardware.