Violence can be identified as an outreaching on others’ dignity,
freedom, properties, and life. Therefore, violent actions cannot be determined
only on materialistic attacks such as killing, beating, robbery, rape, and civil
wars, but it also includes the verbal attacks such as insult, threat, and cursing.
Violence against women can be identified as any bad actions that are
done against women, which lead to a physical or psychological harm, and
invade their safety and freedom whether these actions come from men or
women, against one woman or a group of women in special and general
places.
Before, the social, historical and lawful manners concentrated on
sexual distinction between the men and a woman, which, later on, leads to a
womanish revolution in the sixties of the last century. This produced an
international womanish movement that aimed to destroy focusing on
masculinity in society.
This research includes eight chapters. The first chapter deals with the
conceptual and methodical framework. Chapter two is about the past studies.
While chapter three deals with violence against women as a violation to
human rights. Chapter four talks about what human beings inherit from social
traditions that strengthen violence against women. Then in chapter five, we have the types of violence and its different and famous forms in societies. In
chapter six there is analysis to the reasons of violence. While chapter seven
talks about violence in Iraq. And finally, there is a practical study which
includes a list of information applied on five women who are molested to
violence and visit Al- Karkh court. Also, in this research, I depended on the
method of case study, where I have chosen five cases of women who suffer
from violence from different regions in Baghdad. Their case shows how
family violence humiliates woman and subjects her to man’s authority,
without having any social and legislative protection to protect woman in
society.
This research paper studies the use of an environmentally and not expensive method to degrade Orange G dye (OG) from the aqueous solution, where the extract of ficus leaves has been used to fabricate the green bimetallic iron/copper nanoparticles (G-Fe/Cu-NPs). The fabricated G‑Fe/Cu-NPs were characterized utilizing scanning electron microscopy, BET, atomic force microscopy, energy dispersive spectroscopy, Fourier-transform infrared spectroscopy and zeta potential. The rounded and shaped as like spherical nanoparticles were found for G-Fe/Cu‑NPs with the size ranged 32-59 nm and the surface area was 4.452 m2/g. Then the resultant nanoparticles were utilized as a Fenton-like oxidation catalyst. The degradation efficiency of
... Show MoreThis research has presented a solution to the problem faced by alloys: the corrosion problem, by reducing corrosion and enhancing protection by using an inhibitor (Schiff base). The inhibitor (Schiff base) was synthesized by reacting of the substrates materials (4-dimethylaminobenzaldehyde and 4-aminoantipyrine). It was diagnosed by infrared technology IR, where the IR spectrum and through the visible beams proved that the Schiff base was well formed and with high purity. The corrosion behavior of carbon steel and stainless steel in a saline medium (artificial seawater 3.5%NaCl) before and after using the inhibitor at four temperatures: 20, 30, 40, and 50 C° was studied by using three electrodes potentiostat. The corrosion behavior was
... Show Moreترك السلطان عبدالحميد الثاني بصماتهُ على أخاديد الزمان وعلى خارطة المشرق العربي الخاضع للسيطرة العثمانية أنذاك ، لكونهُ أهم شخصية أسلامية غير عربية واجهت الخطر الصهيوني ومحاولاتهم الإستيطانية في مشرق الوطن العربي ، على الرغم من صعوبة الظروف التي كانت تمر بها الدولة العثمانية داخليا ً وخارجيا ً، بما فيها من أطماع اقتسامها بين الاوربين ولذا سموها بالرجل المريض .
Abstract:- Cyberspace is a new arena for conflict between international powers, especially since the cost of cyber-conflict is less than its traditional warfare counterparts regardless of the nature of the weapons used, whether traditional or non-traditional. Cyber conflict is necessarily based on strategies to deter, attack, and defend. The aim of the cybercrime conflict is to ensure the defensive sufficiency of the state, ensuring its national security and safeguarding its supreme interests. Despite Japan-China relations characterized by convergence and cooperation in post-Cold War economic spheres, Japan continues to retain the growing Chinese influence in East Asia. These variables prompted Japan to announce a hedging strategy due to un
... Show MoreThe Journal of Studies and Researches of Sport Education (JSRSE)
This paper examines the impact of the organizational culture prevailing at the university center, Ali KafiTindouf, on the quality of the educational service provided by the university center Ali KafiTindouf from the point of view of the teachers of the center. The questionnaire method was used to determine the effect between the variables studied, by the distribution of 33 questionnaires on a random sample of the study community.
The study found that the organizational culture prevailing at the university center of Ali KafiTindouf contributed to reaching higher levels in the awareness and quality of the educational service provided by the teachers of the center.<
... Show Moreتضمن البحث تحقيق مخطوط"، سرور الفؤاد بالصافنات الجياد في معرفة الخيل
وأسمائياالشيخ محمد العمري" وكما ظاىر من عنوان المخطوط إنوُ يتناول الخيل، والخيل
موضوع ميم في حياة العربي قبل الاسلام باعتباره يمثل جزءاً من تفاصيل حياتو الملازمة لوُ
واعتماده عمييا ىذا أولاً وثانياً ماتحمموُ الخيول من معاني الفروسية والعنفوان وماتثيره في
الأنسان من حب الأقتناع والمتعة المتحققة من النظر إلييا وحبو لمسبق،
This research aims to analyze and evaluate the reality of the total quality management for the central laboratories by comparing systems of work in the laboratories of Al- Kadhimiya Didactic Hospital with the requirements of ISO 17025 to determine the degree of compatibility and the willingness to adapt to the requirements of the above specification and to show the ability of building an applicable quality management system and to identify problems and their mitigations and prevention to increase.
This study gains its importance from the importance of the labs which stems from the fact that the process of health is a set of interrelated activities, Medical examinations and tests con
... Show MoreAbstract
The analysis of Least Squares: LS is often unsuccessful in the case of outliers in the studied phenomena. OLS will lose their properties and then lose the property of Beast Linear Unbiased Estimator (BLUE), because of the Outliers have a bad effect on the phenomenon. To address this problem, new statistical methods have been developed so that they are not easily affected by outliers. These methods are characterized by robustness or (resistance). The Least Trimmed Squares: LTS method was therefore a good alternative to achieving more feasible results and optimization. However, it is possible to assume weights that take into consideration the location of the outliers in the data and det
... Show MoreHospitals are part of the service organizations and most importantly at the level of individuals because they are tied to the people health and their daily lives , the nursing service is one of the important services provided by hospitals, and nurses are the human resource that offers this service, from this standpoint the idea of research came to prepare work Scheduling for nurses in a scientific way to improve performance operational for their services and provide efficient service available 24 hours a day, the research use one of the modern and scientific rules of scheduling its “schedule of
... Show More