Husbands’ violence towards their wives is one of the greatly important issues in social sciences. Accordingly, the current study aims at determining the levels of violence practiced by husbands towards their wives to propose a professional program from the perspective of the general practice of social work to overcome such a phenomenon. The study is descriptive in nature, where the researcher has used a comprehensive social survey method. To achieve the goal of the study, the researcher has prepared a questionnaire that consisted of two parts. The first part contains the primary data of the two sections, and the second contains (38) phrases distributed over four axes to measure the levels and types of violence among the sample’s members. The study has been conducted in the Safety House to Care for Abused Women in Gaza. The study’s sample amounted to (26) battered women. The results have revealed that the level of psychological violence is the most prevalent (81.3%), then comes physical violence (68.6%), then social (68%), and finally, comes economic violence (66.6%). The Study concluded that there are statistically significant differences between the level of violence practiced by husbands towards their wives in the Safety House for the care of battered women according to the variables of wife's educational status, and number of children. In light of these results, the study has concluded a proposed program from the perspective of general public practice to overcome husbands' violence against their wives.
The purpose of the research is to identify the role of Islamic banks in facing the financial crisis in Iraq for the period 2012-2014, and highlight the various factors that contributed to the emergence of the financial crisis, as well as to identify the problems and challenges facing the Islamic banking business in Iraq and identify the reasons and find appropriate solutions, And the development of treatments to avoid the occurrence of such problems and overcome them. The main findings of the research are as follows,Islamic banks (the sample of the study) were affected by the global financial crisis indirectly, as the financial crisis turned into an economic crisis affecting the real economy, because the activity of Islamic banks is more
... Show MoreThe freedom to promote ideas is one of the freedoms protected by constitutions and laws, and it is exercised by individuals through traditional and electronic media. However, this freedom must be exercised according to certain limits, represented by the necessity of respecting human rights, just as individuals have the freedom to exercise their right to publish and express their opinion in every way. Frankly, in return, she must respect the rights of others . Perhaps the development that has occurred in the various media, including journalism, radio, television, and the emergence of a new medium represented by the Internet, has contributed significantly to harming the security of individuals through the promotion of extremist ideas. This be
... Show MoreAbstract
The aim of the research is to identify the level of awareness and emotional experience among university students and to identify the effect of the educational program based on (Guttmann) model for developing awareness and emotional experience among university students by verifying the validity of the following zero hypotheses: 1) There are no statistically significant differences in the development of awareness and emotional experience among university students at the level of (0.05) between the mean scores of the experimental group in the pre and post-tests. 2) There are no statistically significant differences in the development of awareness and emotional experience among university students at the lev
... Show MoreThis study aims to investigate the academic leaders’ perceptions towards the degree of availability of the dimensions of organizational immunity systems at the University of Tabuk, as well as to reveal the statistically significant differences between the average responses of the study sample members about the degree of availability of these dimensions at their university due to the variables of (gender, leadership position, and college specialization). To achieve the objectives of the study, a descriptive survey method was used. The study population consisted of (200) male and female leaders who were academic leaders at the University of Tabuk. A questionnaire was used as a tool for collecting data, which its validity and reliability
... Show MoreSocial networking sites represent one of the modern communication technologies that have contributed to the expression of public opinion trends towards various events and crises of which security crisis is most important being characterized by its ability to influence the community life of the public. In order to recognize its role in shaping opinions of the educated class of the public that is characterized by a high level of knowledge, culture and having experience in dealing with the media. Its advantage is that they have an active audience by expressing their views on the situations, events, and news published on them as well as expressing their attitudes and sympathy with the events. So a number of questions are included in the ques
... Show More
Flavonoids were extracted from Zizyphus spina-christi leaves by Ethyl acetate after acid digested and used as antioxidant. The dried extract was added separately to each sample of fat extracted from hallow cow and sheep bones as follows: T1 cow fat, T2 control for cow fat, T3 sheep fat and T4 control for sheep fat (the control T2 and T4 reffered to samples without added antioxidant).
Samples were stored at -18, 5, 25 and 55 °C for 28 days. The storage trials were conducted at -18, 5 and 25 °C for 28 days for T1, T2, T3 and T4. The chemical indices examined initially and at the end of storage period. PVs was 1.46, 1.46, 1.8 and 1.8 meq/ Kg oil respectively, FFA values were 0.245, 0.245, 0.244 and 0.244% respectively and TBA va
Image classification is the process of finding common features in images from various classes and applying them to categorize and label them. The main problem of the image classification process is the abundance of images, the high complexity of the data, and the shortage of labeled data, presenting the key obstacles in image classification. The cornerstone of image classification is evaluating the convolutional features retrieved from deep learning models and training them with machine learning classifiers. This study proposes a new approach of “hybrid learning” by combining deep learning with machine learning for image classification based on convolutional feature extraction using the VGG-16 deep learning model and seven class
... Show MoreImage classification is the process of finding common features in images from various classes and applying them to categorize and label them. The main problem of the image classification process is the abundance of images, the high complexity of the data, and the shortage of labeled data, presenting the key obstacles in image classification. The cornerstone of image classification is evaluating the convolutional features retrieved from deep learning models and training them with machine learning classifiers. This study proposes a new approach of “hybrid learning” by combining deep learning with machine learning for image classification based on convolutional feature extraction using the VGG-16 deep learning model and seven class
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show More