Preferred Language
Articles
/
jcoeduw-1186
Empowerment of Women… From Value Education to the Creation of Human Morality
...Show More Authors

    This research on women under the title (Empowerment of women…  From value education to the creation of human morality), includes a disclosure of the reasons that prevented women from performing their human role in the development of human societies and treatments that can provide to solve this big problem in the life These communities, especially the Eastern societies and the religious ones, believe that the woman has not received the care and care to raise her human values ​​in order to contribute to the required social contribution, for historical, economic, moral, religious, social and cultural reasons. And by shedding light on specific definitions of the most important rules on which the research relied on in order to create a sound answer to the essence of the problem and to the basic question that the research is trying to address. These rules include conceptual reading of values, research in humanity as moral, And detail in the Empowerment Project as the starting point for the work from the moral inside to the practical outside. The research also discussed a number of topics related to the substance of the problem, including talking about women's freedom and condemning them as total values ​​required. On the one hand, freedom is an affirmation of women's self, and religion is an affirmation of the surrounding issue affecting women.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
DEVELOPING LAMINAR MIXED CONVECTION HEAT TRANSFER THROUGH VERTICAL CONCENTRIC ANNULI WITH ADIABATIC INNER CYLINDER
...Show More Authors

Theoretical and experimental investigations have been carried out on developing laminar
combined free and forced convection heat transfer in a vertical concentric annulus with uniformly
heated outer cylinder (constant heat flux) and adiabatic inner cylinder for both aiding and opposing
flows. The theoretical investigation involved a mathematical modeling and numerical solution for
two dimensional, symmetric, simultaneously developing laminar air flows was achieved. The
governing equations of motion (continuity, momentum and energy) are solved by using implicit
finite difference method and the Gauss elimination technique. The theoretical work covers heat flux
range from (200 to 1500) W/m2, Re range from 400 to 2000 an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of The College Of Education For Women
Deception in Amber Heard and Johnny Depp’s Trials
...Show More Authors

Deception is defined as a linguistic and non-linguistic behavior that is used in interaction in order to make the addressees believe what is believed to be false or lack evidence. McCornack (1992) classifies deception into four manipulative strategies (i.e., fabrication, distortion, equivocation and concealment), other scholars argue that deception encompasses the strategies of “fabrication (outright lying), equivocation (being vague and ambiguous), or concealment (with holding relevant information) Thus, the present study investigates the deception strategies and motives that are used by Johnny Depp and Amber Heard during their defamation trials. Qualitative and quantitative methods are employed when analyzing the data in question. Th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Al-kindy College Medical Journal
Knowledge, attitude and practice regarding measles vaccine campaign among medical and engineering students: Baghdad, 2011
...Show More Authors

Background: The strategy for eliminating measles from Iraq includes conducting mass immunization campaign against measles, within the framework of the national strategic plan for the elimination of this disease. Awareness about this campaign is fundamental for their success.Objective: The study aims at finding out the knowledge, attitudes and practices regarding vaccination against measles among two groups of students in two different colleges ( medical and engineering) .To report uptake of Measles vaccine and reasons for declining the vaccine among medical and non-medical students in the campaignMethod: Across sectional study has been conducted at Al-Kindy College of Medicine/ Baghdad University and University of Technology for the peri

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 13 2024
Journal Name
مجلة واسط للعلوم الریاضیة
تمرينات تنافسية لتطوير التوافق والتوازن وتأثيرها في مهارة التصويب السلمي للاعبات كرة السلة دون (18) سنة
...Show More Authors

Shooting skill in basketball is one of the most important offensive skills and the final stage of the team's attack and the culmination of all skills in which points are scored, including the skill of peaceful shooting. The research aims to prepare competitive exercises and understand the impact of competitive exercises on developing coordination and balance for basketball players under 18 years old. The researcher used the experimental method with the single experimental group approach, including the research community of female athletes in the public directorates of education in Baghdad, totaling (6) directorates and (72) players. The research sample was selected intentionally, consisting of female athletes in the sports activity of the D

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 02 2014
Journal Name
International Journal Of Engineering Research And General Science
Security in Cloud Computing
...Show More Authors

Becloud stupefy computing is solid buzzword in the trade. It is timeless in which the advantage seat be leveraged on sound out miserable take into consideration reducing the indict and complication of grant providers. Cloud computing promises to curtail truly and opinionated retrench and approximately specifically concede IT departments focusing on moral projects as contrasted with of misery datacenters contention, It is unconditionally with than on the up internet. Give are sundry consequences of this put together. For the actuality remodeling in turn flock cause get revenge buyer be attractive to. This implies ramble they chaperone custody of servers, they carry out software updates and assistant on the condense user pay

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Combining a Hill Encryption Algorithm and LSB Technique With Dispersed Way for Securing Arabic and English Text Messages Hidden in Cover Image
...Show More Authors

         In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate      ( 75-86) that differentiates according to  length of message and image resolution.

View Publication Preview PDF
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
Building a Training Program on Developing Executive Functions for Kindergarten Children
...Show More Authors

Abstract
The research aims to build a training program to develop some executive functions for kindergarten children. To achieve this goal, the two researchers built the program according to the following steps:
1. Determining the general objective of the program.
2. Determining the behavioral objectives of the program.
3. Determining the included content in the program.
4. Implementing the content of the activities of the program.
5. Evaluating the Program.
The program included (12) training activities, the training activities included several items: the title of the activity, the time of implementation of the activity, the general objective of the activity, the procedural behavioral objective, the means and tools u

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 31 2023
Journal Name
College Of Islamic Sciences
Heretic rulings And related words in Islamic jurisprudence
...Show More Authors

How I was eager to research the ruling on three of the most dangerous types to Islam and Muslims (the heretic, the sorcerer, the innovator, and related terms).
Because it is the most dangerous deadly disease that destroys the hearts of Muslims, and may even expel a Muslim from the circle of Islam, and how many Muslims have done or committed such a thing without knowing it. Indeed, how many Muslims have left Islam and whose wife has abandoned him without realizing it, and among them are those who have committed it without knowing it. As well as related words associated with heresy.( )
Because people debated such matters between extremists and lenient ones, most of whom were extremists, and they did not reach a conclusion. So I decid

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2012
Journal Name
Journal Of Educational And Psychological Researches
Arabic Calligraphy quality standards and teaching methods
...Show More Authors

Arabic calligraphy is one of the ancient arts rooted in history, And that he grew up conflicting views and writings addressed as a, communication tool for the linguistic The teaching calligraphy note an art and science because it depends on the fixed assets and precise rules in his art because centered Beauty It targets teach Arabic calligraphy speed as the education and recitation helps to write fast Which have great interest in the field of education and in life both Also accompanied Arabic calligraphy and scientific renaissance significant knowledge in the Ara

... Show More
View Publication Preview PDF
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
An Improved Image Compression Technique Using EZW and SPHIT Algorithms
...Show More Authors

 Uncompressed form of the digital images are needed a very large storage capacity amount, as a consequence requires large communication bandwidth for data transmission over the network. Image compression techniques not only minimize the image storage space but also preserve the quality of image. This paper reveal image compression technique which uses distinct image coding scheme based on wavelet transform that combined effective types of compression algorithms for further compression. EZW and SPIHT algorithms are types of significant compression techniques that obtainable for lossy image compression algorithms. The EZW coding is a worthwhile and simple efficient algorithm. SPIHT is an most powerful technique that utilize for image

... Show More
View Publication Preview PDF
Crossref (2)
Crossref