Preferred Language
Articles
/
XBeS_o0BVTCNdQwCoSxn
Social Entrepreneurship and Women Empowerment in The Light of The Corona Pandemic": A Field Study from The Point of View of a Sample of Iraqi Women Entrepreneurs
...Show More Authors

This research aims to clarify the conceptual framework of social entrepreneurship shows the importance of the development of social entrepreneurship according to the contextual aspects and the social value achieved from these works. It also identifies the degree of level of a sample of women entrepreneurs in Iraq for the extent of the relationship between social entrepreneurship and women's empowerment. It also explains the impact of entrepreneurial work in empowering women and the extent to which there are individual differences between the average scores of the sample members’ estimation of the level of social entrepreneurship according to social status, age group, educational qualification, and specialization according to the scale of Bag, Bahn & Mc Cline (2000) which included (8) variables, (4) of which were selected for the current research (realization of the pioneering opportunity, creativity, risk taking, proactiveness) at a rate of (5) items for each variable making the total items 20. The second part measures the level of women's empowerment according to Hashemi and Schuler (1993), which included (7) variable and for the current research, (4) were selected: the sense of the self, economic security, the development of pioneering behavior in the public sphere, and participation in decision-making. At the rate of (4) items for each variable, so that the total number of the items of the second part becomes (16). A questionnaire was distributed to (63) female entrepreneurs who were randomly selected in the field of social work. The level of women's empowerment was high. Also, social entrepreneurship had a significant impact on the women's empowerment index, especially in the light of the Corona crisis. The results of the study showed that there is a direct relationship between the degree of appreciation of the members of the sample for the level of social entrepreneurship, and the degree of their appreciation for the level of women’s empowerment. They also revealed that there are differences between the average degrees of the respondents’ assessment of the level of social entrepreneurship due to demographic variables. The study recommended that the priorities of the public business agenda should focus on the requirements of attention social entrepreneurship projects for both sexes, especially women, because of their positive impact on various social, economic and political aspects.

Publication Date
Thu Sep 04 2025
Journal Name
Iraqi Journal For Computer Science And Mathematics
Hotspot Issue Handling and Reliable Data Forwarding Technique for Ocean Underwater Sensor Networks
...Show More Authors

Underwater Wireless Sensor Networks (UWSNs) have emerged as a promising technology for a wide range of ocean monitoring applications. The UWSNs suffer from unique challenges of the underwater environment, such as dynamic and sparse network topology, which can easily lead to a partitioned network. This results in hotspot formation and the absence of the routing path from the source to the destination. Therefore, to optimize the network lifetime and limit the possibility of hotspot formation along the data transmission path, the need to plan a traffic-aware protocol is raised. In this research, we propose a traffic-aware routing protocol called PG-RES, which is predicated on the ideas of Pressure Gradient and RESistance concept. The proposed

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Jul 02 2016
Journal Name
Iraqi Medical Journal
Screeing for Hepatitis ( HBs Ag) and Hepatitis C (HCV Ab) Among Dialysis Children.
...Show More Authors

Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 15 2020
Journal Name
Emerging Trends In Mechatronics
Interactional Modeling and Optimized PD Impedance Control Design for Robust Safe Fingertip Grasping
...Show More Authors

View Publication
Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Build and Implemented Learning Package for Prolog Programming Language Using Visual Basic.Net 2010
...Show More Authors

E-Learning packages are content and instructional methods delivered on a computer
(whether on the Internet, or an intranet), and designed to build knowledge and skills related to
individual or organizational goals. This definition addresses: The what: Training delivered
in digital form. The how: By content and instructional methods, to help learn the content.
The why: Improve organizational performance by building job-relevant knowledge and
skills in workers.
This paper has been designed and implemented a learning package for Prolog Programming
Language. This is done by using Visual Basic.Net programming language 2010 in
conjunction with the Microsoft Office Access 2007. Also this package introduces several
fac

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
Self-image addiction (Salafi) and its relation to narcissistic personality disorder among students
...Show More Authors

Abstract The goal of current study was to identify the relationship between addiction of self-images (Selfie) and personality disorder of narcissus, and the difference of significance the relationship between addiction self-images (selfie) and personality disorder narcissus at students of Mustansiriya university, addiction self- images (selfie) defined: a photograph that one has taken of oneself, typically one taken with a smartphone or webcam and shared via social media, edit and down lowed to social networking sites, and over time, the replacement of normal life virtual world, which is accompanied by a lack of a sense of time, and the formation of repeated patterns increase the risk of social and personal problems. To achieve the goals

... Show More
View Publication Preview PDF
Publication Date
Fri May 04 2018
Journal Name
Wireless Personal Communications
IFRS: An Indexed Face Recognition System Based on Face Recognition and RFID Technologies
...Show More Authors

View Publication
Scopus (10)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Mon Oct 28 2019
Journal Name
Journal Of Mechanics Of Continua And Mathematical Sciences
Heuristic Initialization And Similarity Integration Based Model for Improving Extractive Multi-Document Summarization
...Show More Authors

View Publication
Clarivate Crossref