Recently, women's rape has been a pervasive problem in the Iraqi society. Thus, it has become necessary to consider the role of language and its influence on the common beliefs and opinions about rape in the Iraqi society. Thus, taking into consideration the critical role of language and its impact on the perception of human reality and the social development based on people's beliefs and principles of life has become highly indispensable. Therefore. The aim of this article is to address this problem critically from legislation and social norms in NGOs' reports (2015; 2019) with reference to some provisions from the Iraqi Panel Code (1969; 2010). Therefore, the researchers examine the discursive strategies and ideological viewpoints in the selected data through the employment of critical discourse analysis. Specifically, the researchers have adopted van Dijk's (2011) socio-cognitive approach and van Dijk's (2000) ideological model to show how language produces and reproduces domination and abuse of power, engendering as a result injustice and inequality. The study has concluded that the NGOs' reports are written in a language that reflects the attitudes and opinions which might be shared among group members. These reports rely heavily on the linguistic device that is of evidentiality to assure the credibility of giving evidence about the domination of social norms in relation to women's rape. More importantly, the dichotomy of positive and negative representation is highly adopted as an ideological strategy, showing the conflict between the legislation and social norms. Therefore, the study has recommended that the government in its legal institutions should provide provisions to protect the raped women from society and from their families.
This study includes the preparation of the ferrite nanoparticles CuxCe0.3-XNi0.7Fe2O4 (where: x = 0, 0.05, 0.1, 0.15, 0.2, 0.25, 0.3) using the sol-gel (auto combustion) method, and citric acid was used as a fuel for combustion. The results of the tests conducted by X-ray diffraction (XRD), emitting-field scanning electron microscopy (FE-SEM), energy-dispersive X-ray analyzer (EDX), and Vibration Sample Magnetic Device (VSM) showed that the compound has a face-centered cubic structure, and the lattice constant is increased with increasing Cu ion. On the other hand, the compound has apparent porosity and spherical particles, and t
... Show MoreThe purpose of this research is to demonstrate the impact of deposit insurance to reduce banking risks, as banks in various countries of the world face a variety of risks that led to banking and financial crises that led to the failure and bankruptcy of many of its bank, which led to the banks to find quick and appropriate solutions to get rid of these difficulties These solutions include the use of bank deposit protection system for the many risks and sequences of crises that accompanied the Iraqi banking work of thefts, forgery, embezzlement and changing and unstable circumstances. The importance of studying the subject of research through the theoretical framework of banking risks as well as the framework of consideration In order to
... Show Moreمشكلة البحث The Problem of the Research
يعّد التحصيل الدراسي للطلبة عموما من أهم أركان النشاط العقلي في المجال التربوي، فلا تكاد تخلو منه أيه مدرسة، أبتداءً من المدارس الابتدائية وقد تسبقها رياض الأطفال، إلى المدرسة الإعدادية والجامعية ، وقد تمتد إلى مراحل متقدمة في العمر، فكان الطالب وما يزال هو محور العملية ال
... Show MoreThe economical design of plate loaded by pressure can be obtained by using stiffeners instead of increasing the thickness of plate. The main subject of this work is to obtain the effect of stiffener height on the maximum stress in the plate subjected to pressure load. Different plate-stiffener sets are selected to find the effects of stiffener thickness, plate dimensions and pressure, on the optimum stiffener height. The models under consideration are square plates clamped rigidly from four edges. Finite Element method is used to analyze 160 different models by using the Finite Element software package ANSYS version 11. Another analysis method based on maximum stress equation is used to analyze 30 models. The graphical comparison of results
... Show MoreWater/oil emulsion is considered as the most refractory mixture to separate because of the interference of the two immiscible liquids, water and oil. This research presents a study of dewatering of water / kerosene emulsion using hydrocyclone. The effects of factors such as: feed flow rate (3, 5, 7, 9, and 11 L/min), inlet water concentration of the emulsion (5%, 7.5%, 10%, 12.5%, and 15% by volume), and split ratio (0.1, 0.3, 0.5, 0.7, and 0.9) on the separation efficiency and pressure drop were studied. Dimensional analysis using Pi theorem was applied for the first time to model the hydrocyclone based on the experimental data. It was shown that the maximum separation efficiency; at split ratio 0.1, was 94.3% at 10% co
... Show MoreTwo well-known fluorescent molecules: fluorescein sodium salt (FSS) and 2,7-dichloro fluorescein (DCF) were tried to prove the efficiency, trustability and repeatability of ISNAG fluorimeter by using discrete and continuous flow injection analysis modes.A linear range of 0.002-1 mmol/L for FSS and 0.003-0.7 mmol/L was for DCF, with LOD 0.0018 mmol/L and 0.002 mmol/L for FSS and DCF respectively, were obtained for discrete mode of analysis. While the continuous mode gave a linear range of 0.002-0.7 mmol/L and 0.003-0.5 mmol/L for FSS and DCF respectively, the LOD were 0.0016mmol/L and 0.0018 mmol/L for FSS and DCF respectively. The results were compared with classical method at variable λex for both fluorescent molecules at 95
... Show MoreE-mail is an efficient and reliable data exchange service. Spams are undesired e-mail messages which are randomly sent in bulk usually for commercial aims. Obfuscated image spamming is one of the new tricks to bypass text-based and Optical Character Recognition (OCR)-based spam filters. Image spam detection based on image visual features has the advantage of efficiency in terms of reducing the computational cost and improving the performance. In this paper, an image spam detection schema is presented. Suitable image processing techniques were used to capture the image features that can differentiate spam images from non-spam ones. Weighted k-nearest neighbor, which is a simple, yet powerful, machine learning algorithm, was used as a clas
... Show More