This research aims to clarify the conceptual framework of social entrepreneurship shows the importance of the development of social entrepreneurship according to the contextual aspects and the social value achieved from these works. It also identifies the degree of level of a sample of women entrepreneurs in Iraq for the extent of the relationship between social entrepreneurship and women's empowerment. It also explains the impact of entrepreneurial work in empowering women and the extent to which there are individual differences between the average scores of the sample members’ estimation of the level of social entrepreneurship according to social status, age group, educational qualification, and specialization according to the scale of Bag, Bahn & Mc Cline (2000) which included (8) variables, (4) of which were selected for the current research (realization of the pioneering opportunity, creativity, risk taking, proactiveness) at a rate of (5) items for each variable making the total items 20. The second part measures the level of women's empowerment according to Hashemi and Schuler (1993), which included (7) variable and for the current research, (4) were selected: the sense of the self, economic security, the development of pioneering behavior in the public sphere, and participation in decision-making. At the rate of (4) items for each variable, so that the total number of the items of the second part becomes (16). A questionnaire was distributed to (63) female entrepreneurs who were randomly selected in the field of social work. The level of women's empowerment was high. Also, social entrepreneurship had a significant impact on the women's empowerment index, especially in the light of the Corona crisis. The results of the study showed that there is a direct relationship between the degree of appreciation of the members of the sample for the level of social entrepreneurship, and the degree of their appreciation for the level of women’s empowerment. They also revealed that there are differences between the average degrees of the respondents’ assessment of the level of social entrepreneurship due to demographic variables. The study recommended that the priorities of the public business agenda should focus on the requirements of attention social entrepreneurship projects for both sexes, especially women, because of their positive impact on various social, economic and political aspects.
The current research aims to identify the level of parental treatment methods tolerance, hostility, strictness, and warmth, as well as the level of self-efficacy among middle school students. Moreover, it aims to identify the correlation relationship between the variables of parental treatment methods and self-efficacy among middle school students. The research sample included (150) middle school students. For achieving the objectives of the current research, the researchers adopted a scale of parental treatment methods prepared by (Zughair, 2006), and a scale of self-efficacy prepared by (Youssef, 2016), which were applied in their final form to the research sample. The research reached the following results: parents use a low-level hos
... Show MoreMetric type II bursts are formed from shocks driven by CME or flares which is
indicative of particles (SEPs) accelerated to high energies. This work aims to
investigate the metric type II bursts, CMEs and flare for twenty years (1996-2016,
inclusive) over two solar cycles 23 and 24. The total metric type II bursts was 1378
events divided into two groups: first group associated with CMEs regardless their
properties and this group has (1147) events. The second group associated with flares
which has (231) events. The interstice fraction of this research is the metric type II
associated with CME is 83% whereas only 17% with flare where this very close to
the previous study in 2005 which found 81% despite it was for on
In modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using
... Show MoreQuite anumber of parents and educators of this behavior,which is characterized by exaggerating locomotor activity and impulsivity and recklessness and the difficulty of continuing the status of certain bodily more than one minute ,and the difficulty of waiting to meet aparticular need or desire,it also characterized by thos meddling children the affairs of others and increased their chatter does not seem the case when you listen to talk to them and they characterized by weak self-confidence and are more solid and seem un able to keep ther responses because of the severity of anxiety .The research aims to know impulsive behavior among kindergartens children and its relation ship with some variables, and the sa
... Show MoreIn this study, we made a comparison between LASSO & SCAD methods, which are two special methods for dealing with models in partial quantile regression. (Nadaraya & Watson Kernel) was used to estimate the non-parametric part ;in addition, the rule of thumb method was used to estimate the smoothing bandwidth (h). Penalty methods proved to be efficient in estimating the regression coefficients, but the SCAD method according to the mean squared error criterion (MSE) was the best after estimating the missing data using the mean imputation method
Parents who give their sons arole in making parental decisions and admiring their views are the ones who build confidence and the feeling of competence within themselves and then their edgiest- rent with themselves becones better .
The (A.B) person-ality type is the core base of most psychological and educational studies because it is one of the most important subjects Concerning with the study of growth aspects whether they are physical, mental or Social. The present Study ains to measure the level of parental treatment among high School students, measure the level of (A) Personality type concept among them, recognize Statistically Significant differences in the level of parentaltreatment according gender variable and recognize the C
The thermal maturity , burial history and petroleum generation history of four oil wells selected from four oil fields in Southern Iraq, they are: Nasiriyah(Ns-1 well) , Gharraf (GA-5well) ,Abu Ammood (Ab-1well) and Riffai (Ri-1well) have been studied using 1D basin and petroleum systems modeling. Results showed different period of subsidence, which ranges from high to moderate subsidence, occurred at upper Jurassic to Mid-Cretaceous and slow subsidence in Miocene . The porosity in the studied area represents the highest value in Dammam , Tayarat ,Um-Eradhuma and Khasib Formations. For most of the studied wells, the Paleocene to Miocene has to be regarded as times when the maximum temperature prevailed assoc
... Show MoreAg2O (Silver Oxide) is an important p-type (in chasm to most oxides which were n-type), with a high conductivity semiconductor. From the optical absorbance data, the energy gap value of the Ag2O thin films was 1.93 eV, where this value substantially depends on the production method, vacuum evaporation of silver, and optical properties of Ag2O thin films are also affected by the precipitation conditions. The n-type and p-type silicon substrates were used with porous silicon wafers to precipitate ±125 nm, as thick Ag2O thin film by thermal evaporation techniques in vacuum and via rapid thermal oxidation of 400oC and oxidation time 95 s, then characterized by measurement of
... Show MoreMultiple applications use offline handwritten signatures for human verification. This fact increases the need for building a computerized system for signature recognition and verification schemes to ensure the highest possible level of security from counterfeit signatures. This research is devoted to developing a system for offline signature verification based on a combination of local ridge features and other features obtained from applying two-level Haar wavelet transform. The proposed system involves many preprocessing steps that include a group of image processing techniques (including: many enhancement techniques, region of interest allocation, converting to a binary image, and Thinning). In feature extraction and
... Show MoreAutomated clinical decision support system (CDSS) acts as new paradigm in medical services today. CDSSs are utilized to increment specialists (doctors) in their perplexing decision-making. Along these lines, a reasonable decision support system is built up dependent on doctors' knowledge and data mining derivation framework so as to help with the interest the board in the medical care gracefully to control the Corona Virus Disease (COVID-19) virus pandemic and, generally, to determine the class of infection and to provide a suitable protocol treatment depending on the symptoms of patient. Firstly, it needs to determine the three early symptoms of COVID-19 pandemic criteria (fever, tiredness, dry cough and breat
... Show More