One of topics that occupied alarge area in Iraqi society at the moment is the issue( of tribal separation and its relation to the organization of the community ) so we see in the civilizations and heritage of each community aset of provisions and laws that take the form of status customary or religious it is indicative of the great interest in Iraqi society in cotrolling the behavior of individuals to comply with values and social laws and become their behavior is consistent with the behavior of the total and adhere to the social values and be productive individuals within the subject and this can only be achieved from the social control of the various studies have been to emphasize the rol of informal controls in Iraqi society including the tribal separation Customary and some of the lagal in take side and others covered from the religious side therefore the present study came to shed light on the subject from its different dimensions accoding to its previous variables religion and clan and law the study included two main aspects the first aspects the theoretical side of the study it included four chapters that included the first chapter the first section deal with the general framework of the study to clarify the problem of the study and the importance of the study and the objectives of the study social organization community culture social control the second chapter where the first section included previous studies in the fild of tribal separation to benefit from the methods and tools and results the second section included some theories explain the employment those theories in the interpretation of the separation of tribal clan and tribe As for the the third chapter the clan and the social construction includedtwo topics the first is the clan as asocial structure and the second is the clan and the social patterns it highlighted the most prominent social patterns it highlighted the most prominent social patterns in Iraqi society The fourth chapter of the clan as social control group included the first section of the organization of the clan the Role of the clan in the Settlement of Triblal Disputes the second topic is the active forces in the local community and included the role of central governments , the role of local councils ,the role of civil society organizationsand the nature of the local community and its characteristic the second aspect ,the field aspect of the study where the four chapter of the fifth chapter included the scientific and methodological procedures for the study includeding the methodologica used in the study and how to choose the type of research and procedures for verifying the truthfulness of the tool And stability and statistical means used in chapter six where the three topics included the first topic analysis of demographic data and the second study analysis of the data on the axes of the study the third topic analysis of the results of the study ,Chapter VII the three aspects of the first topic included the relationship between variables His variables adopted either the second topic included the terms of reference of social control informal study in the community either third section included some of the case studies models , the eighth chapter included the results
Back ground: In Iraq, after 2003 had more
accidents of the shell, bullet and stab abdominal
wounds, more over colon injuries.
Objective: The aim of this study is to evaluate
the most appropriate management of penetrating
colon injuries, comparing the primary repair with
the diversion.
Methods: Eighty patient series with shell, bullet
and stab colonic injuries during 4.5 years period
from June 2006-december 2010 at Al-Yarmouk
teaching hospital. The study compared the use of
primary repair versus diversion, analyzing
variables such as sex, age, severity of injury and
mortality rate.
Results: there were total 80 patients ,62 (77.5%)
male and 18(22.5%) female .male :female ratio
3.4:1. the most
For the duration of the last few many years many improvement in computer technology, software program programming and application production had been followed with the aid of diverse engineering disciplines. Those trends are on the whole focusing on synthetic intelligence strategies. Therefore, a number of definitions are supplied, which recognition at the concept of artificial intelligence from exclusive viewpoints. This paper shows current applications of artificial intelligence (AI) that facilitate cost management in civil engineering tasks. An evaluation of the artificial intelligence in its precise partial branches is supplied. These branches or strategies contributed to the creation of a sizable group of fashions s
... Show MoreThe main aim of this research is to introduce financing cost optimization and different financing alternatives. There are many studies about financing cost optimization. All previous studies considering the cost of financing have many shortcomings, some considered only one source of financing as a credit line without taking into account different financing alternatives. Having only one funding alternative powers, restricts contractors and leads to a very specific financing model. Although it is beneficial for the contractor to use a long-term loan to minimize interest charges and prevent a substantial withdrawal from his credit line, none of the existing financial-based planning models have considered long-term loans in
... Show MoreThe process of risk assessment in the build-operate transfer (BOT) project is very important to identify and analyze the risks in order to make the appropriate decision to respond to them. In this paper, AHP Technique was used to make the appropriate decision regarding response to the most prominent risks that were generated in BOT projects, which includes a comparison between the criteria for each risk as well as the available alternatives and by mathematical methods using matrices to reach an appropriate decision to respond to each risk.Ten common risks in BOT contracts are adopted for analysis in this paper, which is grouped into six main risk headings.The procedures followed in this paper are the questionnaire method
... Show MoreBackground: Zinc is involved in a variety of
metabolic processes and it has a well known
antioxidant activity, so the measurement of its serum
level can have a special value in several diseases.
Objectives: The study is designed to determine the
serum zinc level in heart failure patients and to
compare it with that of healthy individuals and to
study the significance of the results obtained.
Methods: Atomic absorption spectrometer
technique was used to determine serum zinc level in
fifty heart failure patients and fifty healthy individuals
who were age and sex matched.
Results: The mean serum zinc level in healthy
individuals was about 45.5% greater than that of heart
failure patients. This diffe
The aim of this research is to find out why some matrix verbs are no longer complemented by the two types of infinitive clauses as it is the case in Elizabethan English . At that time (when Shakespeare was writing ), the same matrix verb triggers the two types of infinitive clauses as its complex transitive complementation .Such free variation is not possible in Present –Day English . In this corpus – based study , it is shown that the choice of the form of the infinitive clause is not free; there are certain syntactic ,sem- antic constraints that dete, - infinitive.
Studies were conducted from 1980 to 1989 to determine the insect pests infested animal museum collections in Iraq. Twelve species of Coleoptera were recovered, eleven belonged to the Dermestidae, and one to the Tenebrionidae. Of these Anthrenus coloratus Reitt. and Phradonoma nobile (Reitt.) were the most commonest and widely distributed species. Trogoderma bactrianum Zhant. and Orphilus niger (Rossi) were recorded here for the first time in Iraq.
In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show More