Social protection meets different aspects of the needs of vulnerable groups, such as the economic, health, education, and family relations and ties in the Iraqi society. This is because vulnerable groups have suffered from social and economic influences that have negative implications on the social reality as a whole. Poverty is a case in point, which paved the way to frequent setbacks that have led to social structure instability. Accordingly, the present study aims to examine the role and effect of the Net of Social Protection Program in equally distributing social protection to curb or mitigate any negative consequnces that might happen to the poor segments and vulnerable people, who are succeptible to shocks, such as: the orphans, unemployed, disabled and the poor. Since such a step reduces poverty rates, the Ministry of Labor and Social Affairs has sought through its social protection network programs to achieve equality, the biggest achievement to the country. Having examined the issue, the researcher has found that there is no social justice in distributing material guarantees to the poor or the people in need. There are several individuals whose names are registered in the lists of the people in need. Such names are either fake or belong to people who do not really need such aids. According the puposes behind the present aims are to: maintain fairness in distributing cash collaterals for the people who live below the poverty line in need, overcome the difficulties of coping with the poor community, deal with those people positively, and uplift them. The study has concluded that the number of poor people is increasing in the Iraqi society. Besides, such groups of people need to be respected, severed and provided with a decent way of living. All such rights are part and parcel of human rights.
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreResearch summary
Westernization is a term not familiar to our scholars at the beginning of the emergence of translation from Western literature, sciences and arts in its detailed form now.
Westernization was not an issue that those Greeks, Persians, Romans, Indians and others worked on translating those sciences and cultures. Rather, it was a process of transferring a new philosophy and logic that had not been previously seen by the Arabs, so they were affected by it in a strange way, to the point of fascination by some of them. For this reason, this research came to clarify these issues and address them within the scientific methodology.
Value Engineering is an analytical study on projects or services using a specific procedure and a multidisciplinary working group, works for the identification and classification of the project functions; either for a better perfuming of these functions or to lessen the total project cost or the two together. Value Engineering main aim is on finding innovative alternatives, without effecting the basic requirements of the project, its methodology based on the functional balancing between the three elements of production "performance, quality and cost". This methodology based on the "functional analysis", had shown high possibilities in solving any problem facing the production procedure , achieve better investment for available re
... Show MoreThe study tries to answer several questions posed by the subject, one of the important: How the Internet promotes rumor? And what are the most Internet applications that promote rumor? And the practical ways to reduce these negative? Using the process of in vestige and reading theoretical heritage available in this field, and inferred the numbers and statistics marked the uses of the Internet and its applications over recent years, and the characteristics of each these tools in the field of collection, processing, and dissemination of information
The current research dealt with the development of sciences and arts over the course of human history, and the development of sciences with their natural and human trends are important areas in developing the knowledge and application base for industrial product design and design in its various fields. Bionic science is one of the sciences that works on applying biological methods and systems found in nature to study and design engineering systems and modern technology, and for industrial products to be highly efficient, durable and resistant to natural variables in daily life for use. The transfer of technology between life forms and industrial products is desirable because the processes of development at the level of science in general
... Show MoreThis research deals with the study of the obstacles to peaceful coexistence in Iraq. Therefore, our hypothesis is that these obstacles are not attributed to one reason or to one source. Therefore, peaceful coexistence among the components of Iraqi society remains fragile and vulnerable to collapse and threat at any moment. This society, which is already in need of social relations, needs more than ever to coexist and consolidate it. Through the exercise of democracy in Iraq in a manner that guarantees rights and duties for all, to restore mutual trust between the components of this community in a way that feels they are citizens of the state.
The research aims to find out the impact of Lee’s cognitive strategy on the achievement of fifth-grade literary students in the module of history. The research community consists of the secondary female day schools of Al-Karkh Al-Oula Directorate General of Education. The size of the research sample comprises (45) female students of the fifth grade of the literary brunch, (21) students for the experimental group and (24) students for the control group. The researchers have chosen an experimental design with partial control to suit the current research and its goal. They used a unified tool to measure the achievement of female students, which consisted of (50) items characterized by sincerity and they extracted the stability of t
... Show MoreThe study intends to explore the obstacles that encounter a program of rehabilitating released prisoners as perceived by prisoners themselves in tubas' province. To this end, the researcher used a questionnaire as an instrument which was applied on (150) prisoner had chosen randomly to collect the study data. The findings revealed no significant differences among obstacles the encounter program regarding to the following variables: age, detention period, and number of detention, additionally, the findings found that there is a variance of obstacles mean according to the prisoners themselves, rehabilitation program, and the facility of that program.
This work involves three parts , first part is manufacturing different types of laminated below knee prosthetic socket materials with different classical laminated materials used in Baghdad center for prosthetic and orthotic (4perlon layers+2carbon fiber layer+4 perlon layers) , two suggested laminated materials(3perlon layers+2carbon fiber layer+3 perlon layers) and (3perlon layers+1carbon fiber layer+3 perlon layers) ) in order to choose perfect laminated socket . The second part tests (Impact test) the laminated materials specimens used in socket manufacturing in order to get the impact properties for each socket materials groups using an experimental rig designed especially for this purpose. The interface pressure between
... Show MoreAs asphalt concrete wearing course (ACWC) is the top layer in the pavement structure, the material should be able to sustain stresses caused by direct traffic loading. The objective of this study is to evaluate the influence of aggregate gradation and mineral filler type on Marshall Properties. A detailed laboratory study is carried out by preparing asphalt mixtures specimens using locally available materials including asphalt binder (40-50) penetration grade, two types of aggregate gradation representing SCRB and ROAD NOTE 31 specifications and two types of mineral filler including limestone dust and coal fly ash. Four types of mixtures were prepared and tested. The first type included SCRB specification and
... Show More