Social protection meets different aspects of the needs of vulnerable groups, such as the economic, health, education, and family relations and ties in the Iraqi society. This is because vulnerable groups have suffered from social and economic influences that have negative implications on the social reality as a whole. Poverty is a case in point, which paved the way to frequent setbacks that have led to social structure instability. Accordingly, the present study aims to examine the role and effect of the Net of Social Protection Program in equally distributing social protection to curb or mitigate any negative consequnces that might happen to the poor segments and vulnerable people, who are succeptible to shocks, such as: the orphans, unemployed, disabled and the poor. Since such a step reduces poverty rates, the Ministry of Labor and Social Affairs has sought through its social protection network programs to achieve equality, the biggest achievement to the country. Having examined the issue, the researcher has found that there is no social justice in distributing material guarantees to the poor or the people in need. There are several individuals whose names are registered in the lists of the people in need. Such names are either fake or belong to people who do not really need such aids. According the puposes behind the present aims are to: maintain fairness in distributing cash collaterals for the people who live below the poverty line in need, overcome the difficulties of coping with the poor community, deal with those people positively, and uplift them. The study has concluded that the number of poor people is increasing in the Iraqi society. Besides, such groups of people need to be respected, severed and provided with a decent way of living. All such rights are part and parcel of human rights.
The article describes a certain computation method of -arcs to construct the number of distinct -arcs in for . In this method, a new approach employed to compute the number of -arcs and the number of distinct arcs respectively. This approach is based on choosing the number of inequivalent classes } of -secant distributions that is the number of 4-secant, 3-secant, 2-secant, 1-secant and 0-secant in each process. The maximum size of -arc that has been constructed by this method is . The new method is a new tool to deal with the programming difficulties that sometimes may lead to programming problems represented by the increasing number of arcs. It is essential to reduce the established number of -arcs in each cons
... Show MoreThe current research includes several axes, which determine the basic professional skills among kindergarten teachers and government civil Balraudhat and their relationship to educate kindergarten children with life skills teacher Albaiah.boattabar his career. And this profession imposes upon that possesses special skills, qualify him to do his roles. The teacher experimenter, researcher and owner of philosophy and organizer and director of the positions and educational director of the interactions of classroom and non-classroom. And educational systems that are responsible for the preparation of the emerging needs constant review in order to improve internal Kvaiadtha select the best input consistent with the reality of education, so as
... Show MoreThe research aims to study strategic training and its impact on improving the performance of the inspectors general offices in Iraqi ministries, through two variables strategic training Which include Four Dimensions ( Strategic analysis , Formulation of Training Strategy , Implement the Training Strategy , Evaluation ) and Performance included Three dimensions ( Efficiency , Effectiveness , Added-Value).
This research problem is that the Offices of Inspectors rely on pre-made training Programs received from training centers without designing the training programs that provide the employees with the skills and abilities that lead to the implementation of the current and future goals of the orga
... Show MoreDuring the study the current selection seven stations in the Zab River bottom and the Tigris River took samples a month to study the signs of bacterial contamination study coliform and colon fecal Almsobhaat and Almsobhaat Bazah and the total number of bacteria and bacterial gangrene gas causing Knkeran as well as a study to isolate and diagnose some races and types of bacterial pathogens in water or intensityusing the traditional system and the system of intestinal bacteria
The present paper discusses one of the most important Russian linguistic features of Arabic origin Russian lexes denoting some religious worship or some political and social positions like Qadi, Wally, Sultan, Alam, Ruler, Caliph, Amir, Fakih, Mufti, Sharif, Ayatollah, Sheikh.. etc. A lexical analysis of the two of the most efficient and most used words of Arabic origin Russian lexes that are “Caliph and Sheikh” is considered in the present study. The lexicographic analysis of these words makes it possible to identify controversial issues related to their etymology and semantic development.
The study is conducted by the use of the modern Russian and Arabic dictionary, specifically, (Intermediate lexicon Dictionary
... Show MoreBackground: New data suggests that joint damage in Knee Osteoarthritis (KOA) may be caused by systemic factors like adipose tissue products; Adipokines, which may provide a
metabolic link between obesity & KOA. Recently, one of the known adipokines named LEPTIN has been linked to KOA because it can be detected in serum & synovial fluid of
patients with KOA.
Objective: To evaluate the contribution of Leptin & serum lipids to the pathophysiology of Osteoarthritis in Iraqi patients with Knee OA.
Subjects& Methods: The study was carried on 90 subjects divided into four groups: Knee Osteoarthritis cases group (n=60). Control group (n=30). Obese subjects group (n=60).
Non-obese subje
Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show MoreA study of the hadiths of supplication orchestration
Atheism is one of the most dangerous absurd doctrines that have swept the world in the modern era. Its strength lies in the bodies that stand behind it and adopt its ideologies which are accompanied by the tremendous media momentum of the theses of its supporters based on scientific and non-scientific levels. And since the denial of the existence of the Creator is the main focus and central point which the atheists based their view towards the universe, life and man, this humble research came to discuss the claim of the existence of the world by pure chance, and try to explain this scientifically through the theory of natural selection and survival of the fittest developed by the English biologist Charles Darwin. The resea
... Show More