This is an empirical investigation of the tribal power in Iraq and its consequences on the socio-political system. A theoretical background concerning thestate kinship, tribe and tribal involvement in politics has been displayed with example of tribal power over people within the social context. Socio-anthropological method of data collection has been used, including a semi-structured interview with a sample of 120 correspondents. The outcome revealed that the feeble and corrupted state (government) play a vital role in encouraging the tribe to be dominant. The people of Iraq are clinging to the tribe regardless of whether they believe in it or not. Although they are aware that the tribe is a pre-state organisation and marred shape of civil society, they have no alternative since the weak government is incapable of restoring law and order. The feeble government is the main factor for tribal strength, the socio-political structure that yield from direct intervention of the invaders and divided the community into fractions, subcultures, religious and ethnic groups creates paralysed socio-political system that incapable to activate law and order, the tribe in turn fill the government power vacancy and enforce its own law and order. Unfortunately, the tribe misuse the power because its rules out of date, but after all, the people reluctantly rely on the tribe entity for protection.
The practice of art is an inevitable result imposed by the circumstances surrounding the human being, as he needs some knowledge associated with raw materials, tools and methods to develop skills in the formation of elements of the work of art in new ways that give a decent artistic appearance to the work of art. Through the exploratory study carried out by the researcher, which included asking the following question to the third grade students, Department of Art Education:
What types of materials are used in handicrafts and from which sources are they obtained? Through the answers, the problem of research was founded as follows:
-Are the products of students of the Department of Art Education in the handicraft material d
... Show MoreThe study aimed to know the degree to which Islamic education teachers employ the strategy of directed discovery in teaching to develop higher thinking skills (analysis, synthesis, and evaluation) among sixth-grade students at the basic stage in East Nile Province, Khartoum State - Sudan. The researcher used the descriptive-analytical method, and adopted a questionnaire that consisted of (15) indicators representing the skills of analysis, synthesis, and evaluation as a tool of the study. A random sample of (175) Islamic education teachers was selected, from the Department of Basic Education. The data were analyzed according to the Statistical Packages for Social Sciences (SPSS) program, and the results of the study have shown that the u
... Show MoreIn The Name of Allah Most Gracious Most Merciful
The fundamentals of jurisprudence have a great role in facilitating the ways to know the Shari’a rulings for everything that takes place between people in terms of relationships, and the actions that are issued by them, because without it, the sources from which the rulings were taken are not known, and the methods used by the imams of ijtihad in taking these rulings from those sources are not understood. The foundations on which they followed in the interpretation of texts and its rules, and Muslim scholars in different eras celebrated this science and gave it great care: with what they wrote in it from the works of different directions, but of course the complexity printed many
... Show More The current research aims to highlight the role of human resource management with its practices (human resource planning, selection and placement, training and development, performance evaluation, compensation, and incentives) in raising the level of individuals' performance and its dimensions (task performance, contextual performance, unproductive work behavior, and adaptive performance) by explaining the research problem, which can be limited to the low level of performance of individuals, where the researchers use the descriptive analytical approach and the SPSS program in the practical aspect of the research community represented by the general manager and his assistant
The research aims to identify the level of psychological burnout among the professors of Sana’a University in light of the armed conflicts in Yemen. The research sample consisted of (104) faculty members. A descriptive-analytical approach was adopted. The results of the research showed that university professors suffer from psychological burnout at a very high level in the overall score of the scale. There were no statistically significant differences in terms of gender, academic degree, teaching experience, marital status, number of family members, or salary. In light of the results, the researcher presented a number of relevant recommendations and suggestions.
Congenital hand and forearm anomalies pose a unique challenge in plastic and pediatric surgery. We present a case report of an 8- months-old girl with a congenital left sided hand and forearm anomaly, provisionally diagnosed as atypical left mirror hand anomaly. Classically there is absence of radius and duplication of ulna; however, our case had normal radius and ulna and a hand with seven digits arranged in two groups. We did a surgery which involved a ray amputation of the finger ulnar to the most radial digit, aiming to preserve an adequate first web space to reconstruct the thumb. The result of the surgical treatment in both functional and cosmetic aspects was, in authors’ opinion, good.
Several Intrusion Detection Systems (IDS) have been proposed in the current decade. Most datasets which associate with intrusion detection dataset suffer from an imbalance class problem. This problem limits the performance of classifier for minority classes. This paper has presented a novel class imbalance processing technology for large scale multiclass dataset, referred to as BMCD. Our algorithm is based on adapting the Synthetic Minority Over-Sampling Technique (SMOTE) with multiclass dataset to improve the detection rate of minority classes while ensuring efficiency. In this work we have been combined five individual CICIDS2017 dataset to create one multiclass dataset which contains several types of attacks. To prove the eff
... Show MoreDrilling well design optimization reduces total Authorization for Expenditures (AFE) by decreasing well constructing time and expense. Well design is not a constant pattern during the life cycle of the field. It should be optimized by continuous improvements for all aspects of redesigning the well depending on the actual field conditions and problems. The core objective of this study is to deliver a general review of the well design optimization processes and the available studies and applications to employ the well design optimization to solve problems encountered with well design so that cost effectiveness and perfect drilling well performance are achievable. Well design optimization processes include unconventional design(slimhole) co
... Show MoreThe basic solution to overcome difficult issues related to huge size of digital images is to recruited image compression techniques to reduce images size for efficient storage and fast transmission. In this paper, a new scheme of pixel base technique is proposed for grayscale image compression that implicitly utilize hybrid techniques of spatial modelling base technique of minimum residual along with transformed technique of Discrete Wavelet Transform (DWT) that also impels mixed between lossless and lossy techniques to ensure highly performance in terms of compression ratio and quality. The proposed technique has been applied on a set of standard test images and the results obtained are significantly encourage compared with Joint P
... Show MoreVariable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required information (the
... Show More