The definition of the role of any institution in society is achieved through its objectives, The same is true for the military and how to deal with security threats in the humanitarian field ,Terrorism, which has almost replaced the traditional pattern of war, has waged a street war and intimidated individuals, families and society ,On the other hand, he found someone to meet him from a popular crowd of volunteers to defend their homeland from different sects, sects and religions, Thus, our study will be exposed to the role of popular mobilization in human security from a sociological point of view in Samarra, a field study of 100 male and female respondents.
In this research, the covariance estimates were used to estimate the population mean in the stratified random sampling and combined regression estimates. were compared by employing the robust variance-covariance matrices estimates with combined regression estimates by employing the traditional variance-covariance matrices estimates when estimating the regression parameter, through the two efficiency criteria (RE) and mean squared error (MSE). We found that robust estimates significantly improved the quality of combined regression estimates by reducing the effect of outliers using robust covariance and covariance matrices estimates (MCD, MVE) when estimating the regression parameter. In addition, the results of the simulation study proved
... Show MoreThe art of synthesis is one of the most important pillars in cinematic art, as the director combines cinematic shots to produce a third shot in the mind of the recipient by various methods such as mental synthesis, analogous synthesis, rhythm synthesis, parallel synthesis and repetitive synthesis, Repetitive synthesis is one of the most important techniques in cinematic montage. Through repetitive synthesis, the director is able to link the shots and scenes with each other, and this is what we see in the poetic imagery of Adnan Al-Sayegh when he links the visual images to each other, especially those images that manifest the manifestations of grief and misery following the misfortunes that befell in His homeland. This study follows the d
... Show MoreIn this paper new methods were presented based on technique of differences which is the difference- based modified jackknifed generalized ridge regression estimator(DMJGR) and difference-based generalized jackknifed ridge regression estimator(DGJR), in estimating the parameters of linear part of the partially linear model. As for the nonlinear part represented by the nonparametric function, it was estimated using Nadaraya Watson smoother. The partially linear model was compared using these proposed methods with other estimators based on differencing technique through the MSE comparison criterion in simulation study.
The research deals with the subject of «ways to face rumors in the site of social networking Facebook», a research based on a doctoral thesis, as the research dealt with rumors in the most dangerous type of new media, which sites of social communication with the global community as spreading rumors of all kinds and afflicts everyone who has eyes on him Of the audience of these sites, and aims to identify the rumors on Facebook because it is one of the most popular sites in the world and the strategy of combating the rumors published by Facebook users in their personal pages and groups that organize them, as well as identify methods and methods that can be During which the face of the rumors in the said site and eliminate them t
... Show MoreIt is found in the book "Ibn Aqeel: Alfiya Ibn Malek" that there are some linqustical aspected are related to the native tribal speakers like Tamim or Tie or some others. Sometimes in the book he said "some Arabian said without mentioning the name of the tribe.
As weel, he hasn’t mentioned the accent but he does mention the language. In the book, he has brought back the most important and the biqqest Arabian tribes suchas tribes of Hegaz, Tamim, Hatheyal, son of Anber, Tie, Rabia Bin Wael, Bani Katham, Au there, Bani AL Harth, Bani Kalb, Bani Hgim, Zabid, Hamedan, Alia Qais, Bani Ameer and many others. However, the most mentioned tribes were Hegaz and Tami.
Hence, the importance of the book expiain Ibn Aqeel by mentioning these A
Objective(s): The main aim of the study is to determine the level of burden on mothers toward children with anorectal malformation.
Methodology: A descriptive study was carried out at Welfare Pediatric Teaching Hospital and Central Pediatric Teaching Hospital in Baghdad City. From November 15th, 2017 to April 29th, 2018. Convenient sample comprised of (140) children mothers with anorectal malformation were interviewed for the study. The instrument of study is composed of six domains related mothers' burden toward psychosocial burden as a result of child with anorectal malformation. Validity of the study instrument was determined through a panel of experts and the reliability of the questionnaire is determined in a pilot study among (1
Biodiversity is one of the important biological factors in determining water quality and maintaining the
ecological balance. In this study, there are 223 species of phytoplankton were identified, and they are as
follows: 88 species of Bacillariophyta and were at 44%,70 species of Chlorophyta and they were at 29 %, 39
species of Cyanophyta and they were at 16 %, 12 species of Euglenozoa and they were at 4 %, four species of
Miozoa and they were at 3 %, and, Phylum Charophyta and Ochrophyta were only eight and two species,
respectively and both of them were at 2%. The common phytoplankton recorded in the sites studied
include Nitzschia palea, Scenedesmus quadricauda, Oscillatoria princeps, and Peridinium
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Background: The prevalence of obesity is continuously rising world-wide. Obesity is an important risk factor of cardiovascular disease (CVD), metabolic syndrome (MS), and type 2 diabetes (T2D).
Objective: To estimate the frequency of MS in obese versus non-obese subjects in Basrah, Iraq .
Methods: This is a prospective clinical study performed in Al-Sadr Teaching Hospital, Basrah, and included 86 obese subjects (with a BMI ≥ 30), 39 males and 47 females, and 132 non-obese subjects ( with a BMI < 30 ), 60 males and 73 females as a control group. Measurement of height, weight, waist circumference (WC), blood pressure ( BP ), fasting blood glucose ( FBG ), total cholesterol (TC), triglycerides (TG ) and high density lipoprotein-
Background: Bell's palsy was defined as facial weakness of lower motor neuron type caused by idiopathic facial nerve involvement outside the central nervous system without evidence of aural or more widespread neurologic disease. The cause is unclear, but the disorder occurs more commonly in diabetics.Objectives: to differentiate cases of idiopathic Bell's palsy from diabetic mononeuropathy presented with Facial nerve palsy by assessing the taste, because they differ in etiology, management & prognosis.Patients &Methods: One hundred and fifteen consecutive patients were referred for the treatment of facial palsy, from May the 5th 2012 to April 12th 2013 in Al-Kindy Teaching Hospital and The Neurosciences Hospital, in Baghdad / Ira
... Show More