Preferred Language
Articles
/
abaa-1191
The Self and the Other in the Dogmatic Discourse: The Cognitive and Emotional Structure of the Authoritarian and Destructive Personality
...Show More Authors

The philosopher and social psychologist Erich Fromm (1900-1980), in his book "Escape from Freedom" highlighted the distinction between the "I" of the authoritarian personality and the "I" of the destructive personality based on their stance towards "the other." The former (the authoritarian self) relies on a submissive, enslaving formula, where the "I" is the master/dominator/controller/strong, while "the other" is the servant/submissive/controlled/weak, essential for perpetuating this formula. In contrast, the latter (the destructive self) relies on an annihilating, negating formula, where the "I" is existence/killer/destroyer/persistent, while "the other" is non-existence/killed/destroyed/temporary. From these two formulas stem all extremist violent tendencies and practices.

In a world teeming with such tendencies and practices, delving into the structures of these formulas becomes a paramount existential necessity, especially since these formulas permeate every facet of life: personal, political, social, religious, media, economic, and academic, transforming the world into arenas of bloody conflicts, disfiguring the "I" and annihilating the "other."

Researchers have studied the psychological-social dynamics of these formulas. However, there hasn't been a comprehensive approach employing "dogmatism" as discourse to explore the structural essence of these formulas, which this study aims to achieve.

In his book "The Open and Closed Mind: Investigations into the Nature of Belief Systems and Personality Systems" social psychologist Milton Rokeach (1918-1988) studied the "Dogmatic Mentality": a relatively closed cognitive system of beliefs and non-beliefs organized around a core set of beliefs related to the dangerousness and threat of the world and a middle set of beliefs associated with absolute dominant power. When this structure crystallizes as a discourse, it widens, deepens, and solidifies, dissolving the "I" into "power" and negating "the other" as an independent, equal human entity, becoming, in communicative and media outcomes, material for manipulation and intimidation.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jun 30 2009
Journal Name
Al-kindy College Medical Journal
The impact of advancing age on total serum IgE in asthmatic patient
...Show More Authors
 

Abstract

The current study was conducted to assess the effect of advancing age on total serum IgE level in asthmatic patients. To this purpose, 90 asthmatic patients and 30 healthy individuals ( control group ) were enrolled. Asthmatic patients were categorized into four groups. Group A consisted of asthmatic patients (9) whose age was more than 20 and up to 30 y. Group B contained asthmatics (13) of age more than 30 and up to 40 y. Group C comprised those (23) of more than 40 and up to 50 y. Group D consisted asthmatic patients (45) of age more than 50 y. Total serum IgE level significantly changed in group D patients when compared with those of

... Show More
View Publication Preview PDF
Publication Date
Sat May 30 2020
Journal Name
Neuroquantology
Desertification Monitoring in the South-West of Iraqi Using Fuzzy Inference System
...Show More Authors

In this research, the region in the south-west of Iraq is classified using a fuzzy inference system to estimate its desertification degree. Three land cover indices are used which are the Normalized Difference Vegetation Index, Normalized Multi-Band Drought Index and the top of atmosphere surface temperature to build a fuzzy decision about the desertification degree using eight decision roles. The study covers a temporal period of 38 years, where about every 10 years a sample is elected to verify the desertification status of the region, starting from 1990 to 2018. The results show that the desertification status varied every 10 years, wherein 2000 encountered the highest desertification in the south-west of Iraq.

View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Determination the concentration of radon in human urine using LR-115 detector
...Show More Authors

In the present study twenty samples of human urine were taken
from healthy male and female with different of: ages, occupation and
place of residence. These samples were collected from the hospital to
measure the concentration of radon gas in human urine by using one
of solid state nuclear track detectors LR-115.
The results obtained of the concentrations of radon in healthy human
urine are varying from 2.12×10-3 Bq.l-1 to 4.42×10-3 Bq.l-1 and
these values are less than the allowed limits 12.3×10-3 Bq.l-1.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
Cheating in E-learning from the perspective of lecturers within Iraqi universities
...Show More Authors

Online examination is an integral and vital component of online learning. Student authentication is going to be widely seen when one of these major challenges within the online assessment. This study aims to investigate potential threats to student authentication in the online examinations. Adopting cheating in E-learning in a university of Iraq brings essential security issues for e-exam . In this document, these analysts suggested  a model making use of a quantitative research style to confirm the suggested aspects and create this relationship between these. The major elements that might impact universities to adopt cheating electronics were declared as Educational methods, Organizational methods, Teaching methods, Technical meth

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
The Training Needs of Middle StagLeaders in Bisha, Saudi Arabi Teachers’ Perceptions
...Show More Authors

The present study is meant to inquire about the training needs of middle stage leaders in Bisha, (Saudi Arabia) from the perspective of teachers. To achieve this purpose, the researcher has designed a questionnaire containing (31) items, distributed to a sample of (157) teacher (male and female) from the target population.

This research has demonstrated that the level of training needs for middle stage leaders was moderately reported with an arithmetic mean equivalent to (2.42), and a standard deviation of (0.36). Results have shown no significant differences at (α=0.05) in the sample’s expectations of the study’s variables.

The study concludes with a list of recommendations such as working on developing training pro

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 14 2019
Journal Name
Journal Of Physics: Conference Series
Estimate the Rate of Contamination in Baghdad Soils By Using Numerical Method
...Show More Authors

Journal of Physics: Conference Series PAPER • THE FOLLOWING ARTICLE ISOPEN ACCESS Estimate the Rate of Contamination in Baghdad Soils By Using Numerical Method Luma Naji Mohammed Tawfiq1, Nadia H Al-Noor2 and Taghreed H Al-Noor1 Published under licence by IOP Publishing Ltd Journal of Physics: Conference Series, Volume 1294, Issue 3 Citation Luma Naji Mohammed Tawfiq et al 2019 J. Phys.: Conf. Ser. 1294 032020 DOI 10.1088/1742-6596/1294/3/032020 DownloadArticle PDF References Download PDF 135 Total downloads 88 total citations on Dimensions. Turn on MathJax Share this article Share this content via email Share on Facebook (opens new window) Share on Twitter (opens new window) Share on Mendeley (opens new window) Hide article and author

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (10)
Scopus Crossref
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
A Critical Pragmatic Study of Racism as Conceptualized in the Glorious Quran
...Show More Authors

Racism changes its meaning, shape, purpose or function according to various factors such as time, place, motives, and backgrounds; among others. It seems, however, to have deep roots back in the history of mankind. Such a concept stems from a perceived difference with the other. It is fed by the feeling of being hierarchically superior in opposition to another party that is depicted as inferior. Since ancient times, racism is disguised in different forms and manifests itself on various levels. It is a truism that this ideology can be best presented via language.

Due to its negative implication, racism lends itself to a critical kind of research.  As such, this paper is a critical pragmatic investigation for this phenomenon a

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Apr 30 2021
Journal Name
Iraqi Journal Of Science
A Genetic Algorithm for Task Allocation Problem in the Internet of Things
...Show More Authors

In the last few years, the Internet of Things (IoT) is gaining remarkable attention in both academic and industrial worlds. The main goal of the IoT is laying on describing everyday objects with different capabilities in an interconnected fashion to the Internet to share resources and to carry out the assigned tasks. Most of the IoT objects are heterogeneous in terms of the amount of energy, processing ability, memory storage, etc. However, one of the most important challenges facing the IoT networks is the energy-efficient task allocation. An efficient task allocation protocol in the IoT network should ensure the fair and efficient distribution of resources for all objects to collaborate dynamically with limited energy. The canonic

... Show More
Scopus (4)
Crossref (5)
Scopus Crossref
Publication Date
Thu Jul 01 2010
Journal Name
European Journal Of Physics Education
The Inclusion of Science Process Skills in Yemeni Secondary School Physics Textbooks
...Show More Authors

The aim of this study is to compare and contrast the science process skills (SPS) included in the 10th-12th grade physics textbooks content utilized in Yemeni schools. The study revealed weaknesses and strengths in the textbooks’ content. For instance, a number of science process skills (SPS), such as measuring, predicting and hypothesizing, have been neglected in the 11th grade textbook. For all three textbooks content, the maximum percentage of basic science process skills (BSPS) was devoted to observation. However, the maximum percentage of integrated science process skills (ISPS) was different for each grade: experimenting had the highest percentage for 10th grade, interpreting data for 11th grade, and operational definitions for 12th

... Show More