The research aims to know the traits or characteristics of woman in terms of her external
appearance, motives for her behavior, feelings, mood and ability.
It, moreover, seeks woman’s relationship with others as it is presented by the Iraqi
satirical television show “ State of Melon “.
The researcher adopted for that survey approach using the method of content analysis
to study the research sample represented by “ State of Melon “ show which was
exposed through the screen of a group of channels:
“Hona Baghdad Satellite Channel, then Asia Satellite Channel, Dijla Satellite Channel,
and UTV Satellite Channel.”For this, the researcher used Margaret Gallagher’s Model to analyze the image of
woman in the Show episodes, which amounted to (132) episodes, divided into (the
second season - and the pre-season episodes of the third - and the third season - and
the fourth season - the fifth season).
In the light of this study, the researcher reached a set of results, which are:
1.The woman appeared dependent in her relationship with others, in addition to being
anxious and aggressive in her mood and feelings.
2.The woman image is considered among the hesitant and volatile characters of the
group of competence and capacity characters on the show.
3. At the forefront of the motives for woman›s behavior in the «State of Melon» Show
was that woman was driven by her feelings, while her outward appearance was dominated
by rudeness.
Recently, some prostate cancer patients have acquired resistance to the second -generation drugs (anzalutamide and apalutamide) prescribed for the treatment of this disease due to the emergence of the F876L mutation, which represents a challenge to modern medicine. In this study, a new series of 2-thiohydantoin derivatives were prepared through the reaction of different derivatives of maleimide (1c-4c) with isothiocyanate derivatives. The prepared compounds were diagnosed using FT-IR,1H-NMR ,13C-NMR, Mass spectra. The prepared series compounds has been studied against prostate cancer cells. The MTT assay was used to determine the activity of the prepared compounds against prostate cancer cells. The da
... Show MoreThe results show the inability to apply the Taylor rule within inflation and GDP Gaps because the monetary behave is elated from the Iraqi economy.
When applying the Taylor rule to exchange rate with the inflation and the output gap, the results do not match the nominal price announced by the central thing, which proves the lack of commitment by the Central Bank by using the Taylor rule, whether short-run interest rate or exchange rate (Nominal Anchor), so it did not stay to the Iraqi Central Bank only using the principle of Taylor with the expected inflation rate below the level of output (Macro activity) for the separation of monetary behavior from the real one o
... Show MorePurpose: The purpose of the study is to compare and evaluate Earnings Management in Tunisia and Iraq. Theoretical framework: Earnings Management is an important topic that has been studied by a significant number of researchers, as well as those who are interested in the accounting profession. Earnings Management has gotten a lot of attention from academics, professionals, and other interested parties in recent years (e.g. Kliestik et al., 2020; Rahman et al., 2021; Gamra &Ellouze, 2021) Design/methodology/approach: The sample includes ten banks listed on the Bourse of Tunisia and Iraq Stock Exchanges for the year 2017. We have used a model of Kothari et al., (2005) as a tool to measure Earnings Management in both mark
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreAt the beginning of the twentieth century distorting handling totalitarian phenomena of art, which can be called the stage of the test, transition from the theory of ideal theory and other realistic is not cushy, since it requires vision and reading and other concepts, and in light of this dialectic manifested research problem by asking the following Is affected by the design idealism and realism. Through the above mentioned questions, the researcher found rationale for addressing this problem, the study through his research, which is marked (idealism and realism in a comparative study design). And demonstrated the importance of research in the identification of the concept and the effectiveness of the two theories idealism and realism a
... Show Moreالمرأة نصف المجتمع , وهي التي تلد النصف الاخر وتربيههكذا وصفها الحكماء ولا مسار لارتقاء أي بلد وتقدم أي شعب بدون الارتقاء بالمرأة, وبدون مشاركتها في مسارات التحول والتغيير, لكن المرأة مازالت تعاني من التمييز على أساس النوع , وتتعرض للعنف الجندري مما يشكل عائقا كبيرا امام مشاركتها الحقيقية والفعالة في قيادة دفة الحياة , والأخذ بها نحو عيش حياة طييبة كريمة. تؤكد الوثائق أن العنف القائم على النوع الاجتماعي من الم
... Show MoreBacteria form complex and highly elaborate surface adherent communities known as biofilms.Biofilm have been shown to be associated with several human diseases ,and to colonize a wide variety of medical devices . The current study focuses on contribution of extracted genomic DNA in biofilm formation by P. aeruginosa and K. pneumoniae isolates .The percentages of Pseudomonas aeruginosa recovery from drinking water in this study were 10%(20 positive P. aeruginosa samples ) and K. pneumonia., 7%(14 positive K. pneumonia samples).The results showed that all P.aeruginosa and K. pneumoniae isolates (100%) were slime producer but in different degrees by forming of black
... Show MoreA mathematical eco-epidemiological model consisting of harvested prey–predator system involving fear and disease in the prey population is formulated and studied. The prey population is supposed to be separated into two groups: susceptible and infected. The susceptible prey grows logistically, whereas the infected prey cannot reproduce and instead competes for the environment’s carrying capacity. Furthermore, the disease is transferred through contact from infected to susceptible individuals, and there is no inherited transmission. The existence, positivity, and boundedness of the model’s solution are discussed. The local stability analysis is carried out. The persistence requirements are established. The global behavior of th
... Show MoreThe aim of the research is to: Analyzing the content of the mathematics textbook of the 5th bio-scientific grade according to the Common Core State Standard for mathematics (CCSSM), and to identify the extent of their inclusion of these standards. To achieve this goal, the researcher built the CCSSM after reviewing the literature that dealt with those standards, and its validity was verified by presenting it to a group of referees specialized in the field of methods of teaching mathematics. Thus, the criteria in their final form consisted of six main criteria which are:(numbers and quantities, algebra, conjugations, modeling, geometry, statistics and probability) and included (47) sub-indicators, Then the researcher analyzed the content of
... Show More