This research aims to clarify the conceptual framework of social entrepreneurship shows the importance of the development of social entrepreneurship according to the contextual aspects and the social value achieved from these works. It also identifies the degree of level of a sample of women entrepreneurs in Iraq for the extent of the relationship between social entrepreneurship and women's empowerment. It also explains the impact of entrepreneurial work in empowering women and the extent to which there are individual differences between the average scores of the sample members’ estimation of the level of social entrepreneurship according to social status, age group, educational qualification, and specialization according to the scale of Bag, Bahn & Mc Cline (2000) which included (8) variables, (4) of which were selected for the current research (realization of the pioneering opportunity, creativity, risk taking, proactiveness) at a rate of (5) items for each variable making the total items 20. The second part measures the level of women's empowerment according to Hashemi and Schuler (1993), which included (7) variable and for the current research, (4) were selected: the sense of the self, economic security, the development of pioneering behavior in the public sphere, and participation in decision-making. At the rate of (4) items for each variable, so that the total number of the items of the second part becomes (16). A questionnaire was distributed to (63) female entrepreneurs who were randomly selected in the field of social work. The level of women's empowerment was high. Also, social entrepreneurship had a significant impact on the women's empowerment index, especially in the light of the Corona crisis. The results of the study showed that there is a direct relationship between the degree of appreciation of the members of the sample for the level of social entrepreneurship, and the degree of their appreciation for the level of women’s empowerment. They also revealed that there are differences between the average degrees of the respondents’ assessment of the level of social entrepreneurship due to demographic variables. The study recommended that the priorities of the public business agenda should focus on the requirements of attention social entrepreneurship projects for both sexes, especially women, because of their positive impact on various social, economic and political aspects.
Two unsupervised classifiers for optimum multithreshold are presented; fast Otsu and k-means. The unparametric methods produce an efficient procedure to separate the regions (classes) by select optimum levels, either on the gray levels of image histogram (as Otsu classifier), or on the gray levels of image intensities(as k-mean classifier), which are represent threshold values of the classes. In order to compare between the experimental results of these classifiers, the computation time is recorded and the needed iterations for k-means classifier to converge with optimum classes centers. The variation in the recorded computation time for k-means classifier is discussed.
In this study, we report a statistical study for the relationship between coronal mass ejections (CMEs) and sunspot number (SSN) that were registered during the period 2008-2017 for the solar cycle 24. SSN was extracted from Sunspot Index and Long-term Solar Observations (SILSO), while CMEs number from observations made by the Large Angle and Spectrometric Coronagraph (LASCO) on board the Solar and Heliospheric Observatory mission (SOHO). The present period was adopted to conduct the investigation and obtain the mutual correlation between SSN and CMEs. The relationship between CME, the speed of halo CME, and partial halo CMEs for solar cycle 24 were studied. The analysis of results indicated that the average speed of halo CMEs is almost
... Show MoreMagnesium-doped Zinc oxide (ZnO: Mg) nanorods (NRs) films and pure Zinc oxide deposited on the p-silicon substrates were prepared by hydrothermal method. The doping level of the Mg concentration (atoms ratio of Mg to Zn was chosen to be 0.75% and 1.5%. X-ray diffraction (XRD) and energy-dispersive X-ray spectroscopy (EDX) were performed to characterize the prepared films. X-ray diffraction analysis showed a decrease in the lattice parameters of the Mg-doped ZnO NRs. Under 10V applied bias voltage, the responsivity of p-n junction UV photodiode based on pure ZnO and Mg: ZnO with doping ratio (0.75% and 1.5%) was 0.06 A/W and (0.15A/W and 0.27A/W) at UV illumination of wavelength 365 nm respectively, 0.071 A/W and (0.084A/W and 0.11A/W) fo
... Show MoreThe study aims to identify the level of modesty and self-assertiveness among Tikrit university’s students in regard with students’ gender and major (scientific, human studies), and to identify the correlation between modesty trait and self-assertiveness of students. To this end, the researcher has designed a scale to measure modesty that consisted of four-domains (decency, avoiding of unattractive, pang of conscience, and apprehension). Moreover, the researcher adopted a scale of self-assertiveness that designed by (shawki, 1998). The sample included (600) student on first-stage at the university of Tikrit. The results revealed that students have a high level of modesty and self-assertiveness; there is a correlation between modesty t
... Show MoreEmpirical equations for estimating thickening time and compressive strength of bentonitic - class "G" cement slurries were derived as a function of water to cement ratio and apparent viscosity (for any ratios). How the presence of such an equations easily extract the thickening time and compressive strength values of the oil field saves time without reference to the untreated control laboratory tests such as pressurized consistometer for thickening time test and Hydraulic Cement Mortars including water bath ( 24 hours ) for compressive strength test those may have more than one day.
This study includes Estimating scale parameter, location parameter and reliability function for Extreme Value (EXV) distribution by two methods, namely: -
- Maximum Likelihood Method (MLE).
- Probability Weighted Moments Method (PWM).
Used simulations to generate the required samples to estimate the parameters and reliability function of different sizes(n=10,25,50,100) , and give real values for the parameters are and , replicate the simulation experiments (RP=1000)
... Show MoreIn this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database
In this study, the response and behavior of machine foundations resting on dry and saturated sand was investigated experimentally. In order to investigate the response of soil and footing to steady state dynamic loading, a physical model was manufactured. The manufactured physical model could be used to simulate steady state harmonic load at different operating frequencies. Total of (84) physical models were performed. The parameters that were taken into considerations include loading frequency, size of footing and different soil conditions. The footing parameters were related to the size of the rectangular footing and depth of embedment. Two sizes of rectangular steel model footing were used (100 200 12.5 mm) and (200 400 5.0 mm).
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show More