Begging is an ancient social phenomenon since the Man's creation. It was simple at its beginning to get a living and the family needed, but presently, this simple social phenomenon converted to a big phenomenon which controlled by competent groups away from the values and principles. Their doings are far from humanity representing by the cutting of a hand or a foot and facial distortion or removed eye as a way of attracting people's emotions to get material and incorporeal helps; these doings became a trade which is exchanged by slave traders. Furthermore, different illegal and greedy methods were followed as a way of blackmailing others; contrariwise other cases of begging are doing by a people who real poor and needy. In this case, there will be a chaos and we can't distinguish them; it means that there has been a mix-up between the begging for the need and the begging because of greedy, subsequently, this will lead to prevent charity.
The field research concerning this subject showed that some people particularly the elderly ones were beggars since their childhood. Additionally, the economic reasons play a great role in practicing the profession of begging; as well as the psychological status and the family circumstances create weak and greedy people, whereas with some other people, their faces clarify their misery status because of their poverty.
The internet, unlike other traditional means of communication, has a flexibility to stimulate the user and allows him to develop it. Perhaps, the reason for the superiority of the internet over other traditional means of communication is the possibility of change and transmission from one stage to another in a short period. This means that the internet is able to move from the use to the development of the use and then the development of means and innovation as the innovation of the internet is a logical product of the interaction of the user with the network. The internet invests all the proposals and ideas and does not ignore any even if it is simple. This is represented in social networking sites which in fact reflects personal emotio
... Show Morefashion designers who have benefited greatly from the mobilization of ancient aesthetic ideas in the heritage of the people and guaranteed in their productions so that there is no change In the aesthetic value created by the designers of the research in the ancient heritage to find new signs that reflect the connection of man to the present as the aesthetic value of all the man created by the designs of fabrics and fashion through the ages The problem of research was determined in the absence of a precise understanding of the nature of classical thought in fashion and the absence of a clear perception of the sustainability of this thought in contemporary fashion. He
... Show MoreWe propose an intraguild predation ecological system consisting of a tri-trophic food web with a fear response for the basal prey and a Lotka–Volterra functional response for predation by both a specialist predator (intraguild prey) and a generalist predator (intraguild predator), which we call the superpredator. We prove the positivity, existence, uniqueness, and boundedness of solutions, determine all equilibrium points, prove global stability, determine local bifurcations, and illustrate our results with numerical simulations. An unexpected outcome of the prey's fear of its specialist predator is the potential eradication of the superpredator.
The current research aims to identify the effectiveness of a computerized program in developing mathematical skills among the first cycle students in basic education schools in the Sultanate of Oman. The two researchers used the quasi-experimental approach on an intentional sample consisting of (40) male and female students at Al Kawakeb School for Basic Education (1-4). Two of the basic fourth-grade classes and then randomly distributing them into two groups, one is experimental (20) male and female students who followed the computerized interactive program, and the other is (20) male and female students followed the traditional way. On the other hand, its reliability has reached (0.81), and the results of the research have concluded th
... Show MoreThe Nuclear structure of 110-116Cd isotopes was studied theoretically in the framework of the interacting boson model of IBM-l and IBM-2. The properties of the lowest mixed symmetry states such as the 1+, 2+ and 3+ levels produced by the IBM-2 model in the vibrational-limit U(5) of Cd - isotopes are studied in details. This analysis shows that the character of mixed symmetry of 2+ is shared between and states in 110-114Cd – isotopes, the large shar goes to s, while in isotope, the state is declared as a mixed symmetry state without sharing. This identification is confirmed by the percentage of F-spin contribution. The electromagnetic properties of E2 and Ml operators were investigated and the results were analyzed. Various
... Show MoreThe study included general survey of some districts of Iraq in order to determinate new distribution areas for 33 species of the genus salvia L. ,new collections obtained , new locations for many species recorded. Observed specimens in most Iraqi herbaria were studies and identified. ,the flowering period were also studied
The study included general survey of some districts of Iraq in order to determinate new distribution areas for 33 species of the genus salvia L. ,new collections obtained , new locations for many species recorded. Observed specimens in most Iraqi herbaria were studies and identified. ,the flowering period were also studied
The process of digital transformation is considered one of the most influential matters in circulation at the present time, as it seeks to integrate computer-based technologies into the public services provided by companies or institutions. To achieve digital transformation, basics and points must be established, while relying on a set of employee skills and involving customers in developing this process. Today, all governments are seeking electronic transformation by converting all public services into digital, where changes in cybersecurity must be taken into account, which constitutes a large part of the priorities of nations and companies. The vulnerability to cyberspace, the development of technologies and devices, and the use
... Show More
