The Egyptian labor movement is the oldest trade union movement in the Arab region. Beside, the labor movement in any society is, in fact, only a reflection of the extent of awareness of that class in that society. Such a comparison is based on the degree of social growth the working class has reached. Moreover, the Egyptian working class was characterized by modernity in its inception compared to other social forces and classes. In addition, its development is linked to the level of industrial development of the country. The peasants and craftsmen were the mainstay of production in the Egyptian society over several centuries. The labor union movement also represents the human aspect of the labor force when it encounters and interacts with other social, economic and political forces, meaning that trade unions are the human and popular aspect of economic and political history. Based on the foregoing, the research aims to highlight the main problems and obstacles that faced the labor movement, which was represented by the governmental and party authority with the British colonialism. Based on this, the paper aims to examine the role of labor movement during the Second World War and how it worked to save workers from the economic exploitation and enabled them to obtain their legitimate rights and stand before the capitalists who owned capital. In addition, the Second World War was considered for the working class a psychological school for vocational training and an intellectual school for understanding new principles that the colonialists were working to spread among the Egyptian people during the war period. Accordingly, the researchers adopted the descriptive historical approach scientifically to maintain later the analytical approach. In the light of that, a set of conclusions has reached, such as: The struggle movement of the labor movement is not limited to the workers’ specific demands, but rather extends to struggle for the cause of the homeland (the cause of independence and national liberation).
Samples of the root nodules were collected to isolate different species of the genus Rhizobium from several leguminous plants; Trigonella foenum-graecum, Medicago sativa, Lens culinaris, Vigna mungo, Vicia faba, Phaseolus vulgaris, and Cicer arietinum, and based on their morphological, cultural, and biochemical characteristics, in addition to the identification of each isolate at the species level by amplified polymerase chain reaction (PCR) and using the sequencing of the nitrogenous bases of the 16S rRNA gene, it was identified as Sinrhizobium meliloti, Sinrhizobium meliloti, Bradyrhizobium elkanii, Rhizobium leguminosarium biovar viciae, Rhizobium leguminosarium biovar phaseoli and Mesorh
... Show MoreThis study was undertaken to diagnose routine settling problems within a third-party oil and gas companies’ Mono-Ethylene Glycol (MEG) regeneration system. Two primary issues were identified including; a) low particle size (<40 μm) resulting in poor settlement within high viscosity MEG solution and b) exposure to hydrocarbon condensate causing modification of particle surface properties through oil-wetting of the particle surface. Analysis of oil-wetted quartz and iron carbonate (FeCO₃) settlement behavior found a greater tendency to remain suspended in the solution and be removed in the rich MEG effluent stream or to strongly float and accumulate at the liquid-vapor interface in comparison to naturally water-wetted particles. As su
... Show MoreWater quality assessment offers a scientific basis for water resource development and management. This research aims to assessment of Al-Rustamiya sewage treatment plant depending on annually changes and produces maps that declare changes on parameter during a period (2015-2018). Based on prior Government Department Baghdad Environment data which annually feature changes for samples from Northern Rustamiya have been estimated as a working model. Drawn a map of the Diyala River shows annual changes in the characteristics of the Diyala River, based on northern and southern Rustamiya effluent samples, and Diyala River samples. The characteristics that research focused on were biochemical
Electronic remote identification (ER-ID) is a new radio frequency (RF) technology that is initiated by the Federal Aviation Authorities (FAA). For security reasons, traffic control, and so on, ER-ID has been applied for drones by the FAA to enable them to transmit their unique identification and location so that unauthorized drones can be identified. The current limitation of the existing ER-ID algorithms is that the application is limited to the Wi-Fi and Bluetooth wireless controllers, which results in a maximum range of 10–20 m for Bluetooth and 50–100 m for Wi-Fi. In this study, a mathematical computing technique based on finite state automaton (FSA) is introduced to expand the range of the ER-ID RF system and reduce the ene
... Show MoreSol-gel derived CuCo-oxide coatings as solar selective surfaces, synthesized onto aluminium substrates at various annealing temperatures, are analysed by correlating their structural, chemical bonding states, and surface morphological topographies. As the annealing progressed, all the coatings displayed a Cu0.56Co2.44O4 (ICSD 78-2175) phase with preferential orientation along (400) reflection plane. Rietveld refinement of X-ray diffraction (XRD) data indicate that residual stress and microstrains developed around the coating surfaces are reduced resulting in mechanically stable thin films. Enhancement of the crystallite size and preferred orientation of the surface were confirmed via XRD, field emission scanning electron microscopy (FESEM),
... Show MoreA low speed open circuit wind tunnel has been designed, manufactured and constructed at the
Mechanical Engineering Department at Baghdad University - College of Engineering. The work is one of
the pioneer projects adapted by the R & D Office at the Iraqi MOHESR. The present paper describes the
first part of the work; that is the design calculations, simulation and construction. It will be followed by a
second part that describes testing and calibration of the tunnel. The proposed wind tunnel has a test
section with cross sectional area of (0.7 x 0.7 m2) and length of (1.5 m). The maximum speed is about (70
m/s) with empty test section. The contraction ratio is (8.16). Three screens are used to minimize flow
distu
In this paper, thin films of undoped and nickel oxide (NiO) doped titanium dioxide (TiO2) were prepared using the chemical spray pyrolysis deposition (CSP) technique, with different concentrations of nickel oxide (NiO) in the range (3-9) wt%. The morphological, structural, electrical, and sensing properties of a gas of the prepared thin films were examined. XRD measurements showed that TiO2 films have a polycrystalline structure. AFM analysis showed that these films have a regular structure both before and after doping . The roughness of these films decreased after adding impurities but then the opposite of that took place. The electrical and gas sens
... Show MoreThis work aims to fabricate two types of plasmonic nanostructures by electrical exploding wire (EEW) technique and study the effects of the different morphologies of these nanostructures on the absorption spectra and Surface-Enhanced Raman Scattering (SERS) activities, using Rhodamine 6G as a probe molecule. The structural properties of these nanostructures were examined using X-Ray diffraction (XRD). The morphological properties were examined using field emission scanning electron microscopy (FESEM) and scanning transmission electron microscopy (STEM). The absorption spectra of the mixed R6G laser dye (concentration 1×10-6 M) with prepared nanostructures were examined by double beam UV-Vis Spectrophotometer. The Raman spe
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreUsing a mathematical model to simulate the interaction between prey and predator was suggested and researched. It was believed that the model would entail predator cannibalism and constant refuge in the predator population, while the prey population would experience predation fear and need for a predator-dependent refuge. This study aimed to examine the proposed model's long-term behavior and explore the effects of the model's key parameters. The model's solution was demonstrated to be limited and positive. All potential equilibrium points' existence and stability were tested. When possible, the appropriate Lyapunov function was utilized to demonstrate the equilibrium points' overall stability. The system's persistence requirements were spe
... Show More