This research on women under the title (Empowerment of women… From value education to the creation of human morality), includes a disclosure of the reasons that prevented women from performing their human role in the development of human societies and treatments that can provide to solve this big problem in the life These communities, especially the Eastern societies and the religious ones, believe that the woman has not received the care and care to raise her human values in order to contribute to the required social contribution, for historical, economic, moral, religious, social and cultural reasons. And by shedding light on specific definitions of the most important rules on which the research relied on in order to create a sound answer to the essence of the problem and to the basic question that the research is trying to address. These rules include conceptual reading of values, research in humanity as moral, And detail in the Empowerment Project as the starting point for the work from the moral inside to the practical outside. The research also discussed a number of topics related to the substance of the problem, including talking about women's freedom and condemning them as total values required. On the one hand, freedom is an affirmation of women's self, and religion is an affirmation of the surrounding issue affecting women.
Simulation of the Linguistic Fuzzy Trust Model (LFTM) over oscillating Wireless Sensor Networks (WSNs) where the goodness of the servers belonging to them could change along the time is presented in this paper, and the comparison between the outcomes achieved with LFTM model over oscillating WSNs with the outcomes obtained by applying the model over static WSNs where the servers maintaining always the same goodness, in terms of the selection percentage of trustworthy servers (the accuracy of the model) and the average path length are also presented here. Also in this paper the comparison between the LFTM and the Bio-inspired Trust and Reputation Model for Wireless Sensor Network
... Show MoreThe theory of probabilistic programming may be conceived in several different ways. As a method of programming it analyses the implications of probabilistic variations in the parameter space of linear or nonlinear programming model. The generating mechanism of such probabilistic variations in the economic models may be due to incomplete information about changes in demand, production and technology, specification errors about the econometric relations presumed for different economic agents, uncertainty of various sorts and the consequences of imperfect aggregation or disaggregating of economic variables. In this Research we discuss the probabilistic programming problem when the coefficient bi is random variable
... Show MoreBackground: Coronavirus pandemic (COVID-19) has enormously affected various healthcare services including the one of community pharmacy. The ramifications of these effects on Iraqi community pharmacies and the measures they have taken to tackle the spread of COVID-19 is yet to be explored. In this cross sectional survey, infection control measures by community pharmacies in Sulaimani city/Iraq has been investigated.
Methods: Community pharmacists were randomly allocated to participate in a cross-sectional survey via visiting their pharmacies and filling up the questionnaire form.
Results and discussion:
... Show MoreAbstract
Hexapod robot is a flexible mechanical robot with six legs. It has the ability to walk over terrain. The hexapod robot look likes the insect so it has the same gaits. These gaits are tripod, wave and ripple gaits. Hexapod robot needs to stay statically stable at all the times during each gait in order not to fall with three or more legs continuously contacts with the ground. The safety static stability walking is called (the stability margin). In this paper, the forward and inverse kinematics are derived for each hexapod’s leg in order to simulate the hexapod robot model walking using MATLAB R2010a for all gaits and the geometry in order to derive the equations of the sub-constraint workspaces for each
... Show MoreBackground:Oriental sore occurs mostly in the
mediteranian region , North Africa ,and the Middle East .
Rodents are the main reservoir for the parasite . The wet
type caused by L. major is rural and the dry type caused by
L. tropica is urban and humans are presumably the only
reservoir. Sand fly vectors are involved in all forms.
Objectives: This study aimed to show the most
important bacterial infections concomitant with cutaneous
leishmaniasis .
Methods; The study was performed on 75 patients (ages
1-50 years ) from both sexes were attending Skin Diseases
Department of Ramadi General Hospital during the period
extended from January to June 2000. These patients were
clinically diagnosed as patients
The discourse surrounding lingual sovereignty within the African postcolonial context is profoundly intertwined with the fabric of cultural identity and self-determination. Language serves not merely as a conduit for communication but as a repository for a people's collective consciousness, encapsulating their traditions, thoughts, and perspectives. In the realm of postcolonial literature, this dialogue often grapples with the paradox of expressing indigenous narratives through the linguistic tools of former colonizers. Chinua Achebe's seminal work, "Things Fall Apart," exemplifies this conundrum, artfully weaving the orature and culture of Umuofia within the English language. Achebe's choice to write in English—a language imposed upon hi
... Show MoreThe speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi
... Show MoreThe rate of births delivered by cesarean section (CS) has gone up substantially all over the world. Post-cesarean surgical site infection (SSI) is a common cause of maternal morbidity and mortality that results in prolonged period of hospitalization with increased cost and direct health implications, especially in low socioeconomic population, resource- restricted settings, and war- related conditions with internal forced movement. This study was aimed to find incidence of post cesarean section surgical site infection withthe accompanying risk factors.Pregnant ladies admitted to department of obstetrics and gynecology at Medical City Hospital in Baghdad who had undergone CSs were followed up prospectively from first of January 2017 till end
... Show MoreThe study deals with China's soft power and diplomacy in the Middle East, and it focuses specifically on the tools and foundations of China's soft diplomacy and how it achieves its goals in the region in addition to its challenges in the region. In this regard, the study also focuses on the Chinese Belt and Road Initiative and its soft foundations and how they serve China’s diplomacy and soft power in the region. The study ends with a set of conclusions, perhaps the most prominent of which is that diplomacy and soft power have become a fundamental pillar of China's foreign policy to achieve its foreign goals and to establish an international system compatible with China's principles. As for the Middle East, China has established a poli
... Show MoreInvestigating the strength and the relationship between the Self-organized learning strategies and self-competence among talented students was the aim of this study. To do this, the researcher employed the correlation descriptive approach, whereby a sample of (120) male and female student were selected from various Iraqi cities for the academic year 2015-2016. the researcher setup two scales based on the previous studies: one to measure the Self-organized learning strategies which consist of (47) item and the other to measure the self-competence that composed of (50) item. Both of these scales were applied on the targeted sample to collect the required data