Importance of the research:
The importance of any educational or scientific research through its intellectual arena of facts supply the individual and society, Supports Knowledge and Science Group, which raised will be locked in these topics in the future.
This research seeks to shed light on the image and the role of women and men in the books of the Arabic language in primary education (primary), To illustrate the negative effects of the phenomenon of sexism in textbooks, And its negative impact on emerging, And stay away as much as possible about the distinction between the sexes in the roles and qualities in textbooks traditional stereotypes and remove that put both sexes templates hinder the development of the individual and the limit of its capabilities and ambitions, And impede the march and progress of society. (Hormuz.1988).
The difference between the sexes is based on a patriarchal culture and the world of organized by men for men is the reason for this gender discrimination, Despite the progress made by women in the fields of life. (Lutfi, 1988).
If we go back to the real reason for the gender discrimination we are seeing is due to the composition of the social system in the Arab countries are biased stereotypes, It is necessary to point out that the roles played by women has undergone many profound changes as a result of the rapid cultural change in the present era. (Shriha'a, 1989).
Research Objectives:
The current research aims to:
1- The role and image of women and men in the Arabic language books in primary education in the Republic of Iraq characterization
2-Identification of the positive roles of women in these books.
3-Identify negative roles that emerged by women.
Search Procedures
Sample
Arabic language teachers in primary schools affiliated to the Directorate of Educational Karkh third place in Baghdad, Where was their number (166) teacher.
Search tool
Was drafted resolution for the study analysis of reading books at the elementary level, Where the number of questions (35) Question arranged within three alternatives respectively [ Ok, I dunno, Is Ok], Mark has been under what is appropriate of the three alternatives at the discretion of the Arabic language teacher verified or unverified.
Statistical methods
1. The questions were arranged in descending order according to the resolution percentile weight for each question where
2. The number of occurrences of unloading answer at every level of the three resolution levels.
3. dish Kay law for each question in the questionnaire to calculate the calculated value and compare the value tabular.
Search Results
Through content analysis of reading books at the elementary level and compatibility with the results of the questionnaire, The results can be summarized as follows:
- There are significant differences between the books directed toward males and females and their orientation towards the percentages were clearest evidence of this.
- There is a difference and disparity between male and female attendance at these textbooks in favor of men as Danh and Statistics.- The results showed a significant impact practiced textbooks enshrining sexism process through traditional stereotypical references inherited impose values and standards of society and culture.
- There is a disparity between the number of authors and works, technicians and professionals, scientists and processes, in these books for the benefit of men.
- There is a disparity between the number of poets and poets of poems books in favor of men.
- There is a disparity in the female and male audience, As a secondary female characters, The male pivotal and key often in favor of men.
- There is a disparity between the images and fees earmarked for females and males, The difference is also in favor of men.
The purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management
... Show MoreThe study aimed to assess the frequency of invasive fungal infection in patients with respiratory diseases by conventional and molecular methods. This study included 117 Broncho alveolar lavage (BAL) samples were collected from patients with respiratory disease (79 male and 38 female) with ages ranged between (20-80) years, who attended Medicine Baghdad Teaching hospital and AL-Emamain AL-Khadhymian Medical City, during the period from September 2019 to April 2020. The results in PCR versus culture methods in this study showed that out of 117 samples of fungal infections 30(25.6 %) were detected by culture method, while the 24(20.5%) samples were detected by PCR technique, the most commonly diagnosed pathogenic fungi is Candida spp.
... Show MoreThree-dimensional cavity was investigated numerical in the current study filled with porous medium from a saturated fluid. The problem configuration consists of two insulated bottom and right wall and left vertical wall maintained at constant temperatures at variable locations, using two discretized heaters. The porous cavity fluid motion was represented by the momentum equation generalized model. The present investigation thermophysical parameters included the local thermal equilibrium condition. The isotherms and streamlines was used to examine energy transport and momentum. The meaning of changing parameters on the established average Nusselt number, temperature and velocity distribution are highlighted and discussed.
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreRealizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost
... Show MoreAs cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie
... Show More