Importance of the research:
The importance of any educational or scientific research through its intellectual arena of facts supply the individual and society, Supports Knowledge and Science Group, which raised will be locked in these topics in the future.
This research seeks to shed light on the image and the role of women and men in the books of the Arabic language in primary education (primary), To illustrate the negative effects of the phenomenon of sexism in textbooks, And its negative impact on emerging, And stay away as much as possible about the distinction between the sexes in the roles and qualities in textbooks traditional stereotypes and remove that put both sexes templates hinder the development of the individual and the limit of its capabilities and ambitions, And impede the march and progress of society. (Hormuz.1988).
The difference between the sexes is based on a patriarchal culture and the world of organized by men for men is the reason for this gender discrimination, Despite the progress made by women in the fields of life. (Lutfi, 1988).
If we go back to the real reason for the gender discrimination we are seeing is due to the composition of the social system in the Arab countries are biased stereotypes, It is necessary to point out that the roles played by women has undergone many profound changes as a result of the rapid cultural change in the present era. (Shriha'a, 1989).
Research Objectives:
The current research aims to:
1- The role and image of women and men in the Arabic language books in primary education in the Republic of Iraq characterization
2-Identification of the positive roles of women in these books.
3-Identify negative roles that emerged by women.
Search Procedures
Sample
Arabic language teachers in primary schools affiliated to the Directorate of Educational Karkh third place in Baghdad, Where was their number (166) teacher.
Search tool
Was drafted resolution for the study analysis of reading books at the elementary level, Where the number of questions (35) Question arranged within three alternatives respectively [ Ok, I dunno, Is Ok], Mark has been under what is appropriate of the three alternatives at the discretion of the Arabic language teacher verified or unverified.
Statistical methods
1. The questions were arranged in descending order according to the resolution percentile weight for each question where
2. The number of occurrences of unloading answer at every level of the three resolution levels.
3. dish Kay law for each question in the questionnaire to calculate the calculated value and compare the value tabular.
Search Results
Through content analysis of reading books at the elementary level and compatibility with the results of the questionnaire, The results can be summarized as follows:
- There are significant differences between the books directed toward males and females and their orientation towards the percentages were clearest evidence of this.
- There is a difference and disparity between male and female attendance at these textbooks in favor of men as Danh and Statistics.- The results showed a significant impact practiced textbooks enshrining sexism process through traditional stereotypical references inherited impose values and standards of society and culture.
- There is a disparity between the number of authors and works, technicians and professionals, scientists and processes, in these books for the benefit of men.
- There is a disparity between the number of poets and poets of poems books in favor of men.
- There is a disparity in the female and male audience, As a secondary female characters, The male pivotal and key often in favor of men.
- There is a disparity between the images and fees earmarked for females and males, The difference is also in favor of men.
In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
To finalize any construction investment project, it would be necessary to identify the most significant problems and obstacles that lead to project reluctance and stalling. Unexpected events and conflicts may have disrupted these strategies and impacted project development. Due to the high initial investment costs of construction projects, crises can have an immediate impact, resulting in significant financial losses. The 2014 financial crisis was one of the most prominent crises that Iraq faced, which prompted the researcher to identify and evaluate those obstacles through this research and questionnaires using Pareto scientific theory to exclude factors that do not contribute to project lag. It was discovered that 28 o
... Show MoreDue to the potential cost saving and minimal temperature stratification, the energy storage based on phase-change materials (PCMs) can be a reliable approach for decoupling energy demand from immediate supply availability. However, due to their high heat resistance, these materials necessitate the introduction of enhancing additives, such as expanded surfaces and fins, to enable their deployment in more widespread thermal and energy storage applications. This study reports on how circular fins with staggered distribution and variable orientations can be employed for addressing the low thermal response rates in a PCM (Paraffin RT-35) triple-tube heat exchanger consisting of two heat-transfer fluids flow in opposites directions throug
... Show MoreLuminescent solar concentrator (LSC) are used to enhance photoresponsivity of solar cell. The Quantumdots luminescent solar concentrator (QDLSC) consists of CdSe/CdS core/shell nanoparticles embedded in polyacrylamide polymer matrix positioned on the top surface of the silicon solar cell. This procedure improves the conversion efficiency of the bare silicon solar cell. The conversion efficiency of the solar cell has increased from 7.3% to 10.3%. this improvement is referred to the widening of the response spectral region window of the a- Si. Solar cell.
Wind turbine (WT) is now a major renewable energy resource used in the modern world. One of the most significant technologies that use the wind speed (WS) to generate electric power is the horizontal-axis wind turbine. In order to enhance the output power over the rated WS, the blade pitch angle (BPA) is controlled and adjusted in WT. This paper proposes and compares three different controllers of BPA for a 500-kw WT. A PID controller (PIDC), a fuzzy logic controller (FLC) based on Mamdani and Sugeno fuzzy inference systems (FIS), and a hybrid fuzzy-PID controller (HFPIDC) have been applied and compared. Furthermore, Genetic Algorithm (GA) and Particle swarm optimization (PSO) have been applied and compared in order to identify the optimal
... Show MoreObjectives: Serratia marcescens is a gram-negative pathogen of many species. The ability of S. marcescens to form biofilms and its potent innate resistance to antimicrobials and cleaning solutions are both essential for its pathogenicity and survival. The present study was conducted to investigate the effect of glyceryl trinitrate (GTN) on the biofilm of S. marcescens, as an alternative for antibiotic therapy. Methods: Different specimens, including ear swabs, burns, mid-stream urine, wound swabs, and sputum, were collected from patients who were brought to Al-Ramadi Hospital, Iraq. All samples were cultured, and the colonies that were obtained were detected using the VITEK® 2 compact. The ability of biofilms to develop was e
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show More