One of topics that occupied alarge area in Iraqi society at the moment is the issue( of tribal separation and its relation to the organization of the community ) so we see in the civilizations and heritage of each community aset of provisions and laws that take the form of status customary or religious it is indicative of the great interest in Iraqi society in cotrolling the behavior of individuals to comply with values and social laws and become their behavior is consistent with the behavior of the total and adhere to the social values and be productive individuals within the subject and this can only be achieved from the social control of the various studies have been to emphasize the rol of informal controls in Iraqi society including the tribal separation Customary and some of the lagal in take side and others covered from the religious side therefore the present study came to shed light on the subject from its different dimensions accoding to its previous variables religion and clan and law the study included two main aspects the first aspects the theoretical side of the study it included four chapters that included the first chapter the first section deal with the general framework of the study to clarify the problem of the study and the importance of the study and the objectives of the study social organization community culture social control the second chapter where the first section included previous studies in the fild of tribal separation to benefit from the methods and tools and results the second section included some theories explain the employment those theories in the interpretation of the separation of tribal clan and tribe As for the the third chapter the clan and the social construction includedtwo topics the first is the clan as asocial structure and the second is the clan and the social patterns it highlighted the most prominent social patterns it highlighted the most prominent social patterns in Iraqi society The fourth chapter of the clan as social control group included the first section of the organization of the clan the Role of the clan in the Settlement of Triblal Disputes the second topic is the active forces in the local community and included the role of central governments , the role of local councils ,the role of civil society organizationsand the nature of the local community and its characteristic the second aspect ,the field aspect of the study where the four chapter of the fifth chapter included the scientific and methodological procedures for the study includeding the methodologica used in the study and how to choose the type of research and procedures for verifying the truthfulness of the tool And stability and statistical means used in chapter six where the three topics included the first topic analysis of demographic data and the second study analysis of the data on the axes of the study the third topic analysis of the results of the study ,Chapter VII the three aspects of the first topic included the relationship between variables His variables adopted either the second topic included the terms of reference of social control informal study in the community either third section included some of the case studies models , the eighth chapter included the results
Wireless Multimedia Sensor Networks (WMSNs) are networks of wirelessly interconnected sensor nodes equipped with multimedia devices, such as cameras and microphones. Thus a WMSN will have the capability to transmit multimedia data, such as video and audio streams, still images, and scalar data from the environment. Most applications of WMSNs require the delivery of multimedia information with a certain level of Quality of Service (QoS). This is a challenging task because multimedia applications typically produce huge volumes of data requiring high transmission rates and extensive processing; the high data transmission rate of WMSNs usually leads to congestion, which in turn reduces the Quality of Service (QoS) of multimedia appli
... Show MoreAbstract* Backgrounds The retention of the maxillary complete denture may be influenced by adequate recording in the patient’s mouth, marking, and carving of the post-dam on the maxillary cast. Failure to do so may lead to loss of retention. Successful denture construction with patient’s comfort could be achieved by effective methods of recording, marking, and carving of the post-dam. The aim of the study was to assess Iraqi dentists in their knowledge and application of the post-dam in maxillary complete dentures. Methods Questionnaires were distributed randomly through online Google Forms and 118 Iraqi dentists with different academic degree participated in the study. A multinomial logistic regression model was also used to ass
... Show MoreThe objective of this study was to investigate the levels of depression, anxiety, and stress among dentists during covid-19 lockdown and to investigate the relationship between stress and each mental health state.
A cross-sectional survey on 269 dentists was conducted using DASS-21 and PHQ-9 questionnaires. Bivariate and multivariate models were constructed and the odds ratio (OR) was calculated to assess the strength of the association between an independent categorical variable and the outcome.
Being unsatisfied with the job was as
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show Moreالأثر V بالنسبة إلى sinshT و خواصه قد تم دراسته في هذا البحث حيث تم دراسة علاقة الأثر المخلص والاثر المنتهى التولد والاثر المنفصل وربطها بالمؤثرات المتباينة حيث تم بهنة العلاقات التالية ان الاثر اذا وفقط اذا مقاس في حالة كون المؤثر هو عديم القوة وكذلك في حالة كون المؤثر شامل فان الاثر هو منتهي التولد اي ان الغضاء هو منتهي التولد وايضا تم برهن ان الاثر مخلص لكل مؤثر مقيد وك\لك قد تم التحقق من انه لاي مؤثر مقي
... Show MoreCarbonized nonwoven nanofibers composite were fabricated using the electrospinning method of a polymeric solution composite followed by heat treatment including stabilization and calcination steps. The spun polymeric solution was a binary polymer mixture/organic solvent. In this study, two types of polymers (Polymethylmethacrylate (PMMA) and Polyethylene glycol (PEG)) were used separately as a copolymer with the base polymer (Polyacrylonitrile (PAN)) to prepare a binary polymer mixture in a mixing ratio of 50:50. The prepared precursor solutions were used to prepare the precursor nanofibers composite (PAN: PMMA) and (PAN: PEG). The fabricated precursors nonwoven fibers composite were stabilized and carbonized to produce carbon nonw
... Show MoreThis research presents a comparison of performance between recycled single stage and double stage hydrocyclones in separating water from water/kerosene emulsion. The comparison included several factors such as: inlet flow rate (3,5,7,9, and 11 L/min), water feed concentration (5% and 15% by volume), and split ratio (0.1 and 0.9). The comparison extended to include the recycle operation; once and twice recycles. The results showed that increasing flow rate as well as the split ratio enhancing the separation efficiency for the two modes of operation. On the contrary, reducing the feed concentration gave high efficiencies for the modes. The operation with two cycles was more efficient than one cycle. The maximum obtained effici
... Show MoreCNC machine is used to machine complex or simple shapes at higher speed with maximum accuracy and minimum error. In this paper a previously designed CNC control system is used to machine ellipses and polylines. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD® or 3D MAX and is saved in a well-known file format (DXF) then that file is fed to the CNC machine controller by the CNC operator then that part will be machined by the CNC machine. The CNC controller using developed algorithms that reads the DXF file feeds to the machine, extracts the shapes from the file and generates commands to move the CNC machine axes so that these shapes can be machined.