Violence can be identified as an outreaching on others’ dignity,
freedom, properties, and life. Therefore, violent actions cannot be determined
only on materialistic attacks such as killing, beating, robbery, rape, and civil
wars, but it also includes the verbal attacks such as insult, threat, and cursing.
Violence against women can be identified as any bad actions that are
done against women, which lead to a physical or psychological harm, and
invade their safety and freedom whether these actions come from men or
women, against one woman or a group of women in special and general
places.
Before, the social, historical and lawful manners concentrated on
sexual distinction between the men and a woman, which, later on, leads to a
womanish revolution in the sixties of the last century. This produced an
international womanish movement that aimed to destroy focusing on
masculinity in society.
This research includes eight chapters. The first chapter deals with the
conceptual and methodical framework. Chapter two is about the past studies.
While chapter three deals with violence against women as a violation to
human rights. Chapter four talks about what human beings inherit from social
traditions that strengthen violence against women. Then in chapter five, we have the types of violence and its different and famous forms in societies. In
chapter six there is analysis to the reasons of violence. While chapter seven
talks about violence in Iraq. And finally, there is a practical study which
includes a list of information applied on five women who are molested to
violence and visit Al- Karkh court. Also, in this research, I depended on the
method of case study, where I have chosen five cases of women who suffer
from violence from different regions in Baghdad. Their case shows how
family violence humiliates woman and subjects her to man’s authority,
without having any social and legislative protection to protect woman in
society.
Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show MoreThis research aimed to definite Blending learning (BL) technique, and to know the impact of its use onacademic achievement in Biology course of second class students in secondary special schools in Omdurman Locality and attitudes towards it, to achieve this; researcher adopted the experimental method. The sample was selected of (41) students, chosen from Atabiyah school, were divided into two equals groups: one experimental group reached (26) students studied by using the BL technique, and the second control group (25) students have been taught in the traditional method.
Data has collected by using two tools: achievement test and a questionnaire for measuring the attitudes towards Blend
... Show MoreAbstract:
The current research included " Diagnosis of the reality of the gap for the requirements of Business Continuity Management System According to International Standard (ISO 22301: 2012) in Midland Refineries Company (Daura Refinery) " , for development of an administrative system for Business Continuity is considered a priority in the present day, and in the light of the organizations dependence on computers and information technology in work and communication with others . the international legitimacy (represented by the international organization for standardization (ISO)) remains the basis for matching and commitment , and the importance of the application of Business Continuity Management Syst
... Show MoreAbstract
The study aims to identify the extent to which the applied colleges at the University of Technology and Applied Sciences meet the comprehensive quality standards in light of the national education strategy for the 2040 Vision in the Sultanate of Oman. To do this, the researchers used the descriptive approach. They used a questionnaire as a tool for data collection that was applied to (237) administrators, academics, and support functions. The study found that the extent to which the applied colleges at the University of Technology and Applied Sciences meet the comprehensive quality standards in the light of the National Education Strategy 2040 in the Sultanate of Oman recorded a high range. The study als
... Show MoreObesity-related deaths continue to rise, and thus losing weight in overweight and obese patients is critical to prevent complications. Anredera cordifolia (Ten,) Steenis, species of succulent plant of the genus Basellaceae, is widely used in herbal medicine to decrease body weight. This study evaluated the potential benefits of Anredera cordifolia ethanol extract to reduce body weight in high-fat diet-induced obesity rat model. This was an experimental with post-test only control group design study involving 36 obese rats. They were divided into two groups: three control groups (K1, K2, K3) and three treatment groups (P1, P2, P3). All the groups were induced with high-fat diet, except K1 control group that received a standard di
... Show MoreFrançois Mauriac’s novel The Desert of Love (1949) puts the reader before an experienced sociologist who is skillfully able to analyze the most mysterious human emotions and feelings. The writer's starting point is that people are similar in feelings but different in behavior. He severely criticized the aristocratic class and uncovered its defects and faults.
The novelist presents Courege's family as an example of the aristocratic class. It is a family torn by hatred, selfishness and disagreements due to absence of intimacy and love. This poisoned environment pushes the father and his son, Raymond, to search away for emotional ventures and banned relations
... Show MoreThis work studies the role of serum apelin-36 and Glutathione S-transferases (GST) activity in association with the hormonal, metabolic profiles and their link to the risk of cardiovascular disease (CVD) in healthy and patients' ladies with polycystic ovary syndrome (PCOS). A total of fifty-four (PCOS) patients and thirty-one healthy woman as a control have been studied. The PCOS patients were subdivided on the basis of body-mass-index (BMI), into 2-subgroups (the first group was obese-PCOS with BMI ≥ 30 and the second group was non-obese PCOS MBI<30). Fasting-insulin-levels and Lipid-profile, Homeostatic-model assessment-of-insulin-resistance (HOMA-IR), follicle-stimulating-hormone (FSH), luteinizing-hormone (LH), testosterone and
... Show MoreThe economic units always sought to maintain its market position and Trchinh the technology management and modern methods that will support success factors .vdila about it has become a customer and one profitability analysis of the most practical way benefit of economic units as modern management focus their attention on achieving this satisfaction, as the customers make up the axis of the success of every organization and that there are many government units aiming to profit directs attention to customers and the number of these units increased continuously. The administration used the customer profitability analysis in order to obtain information to assist in making and decision-making process. How to use modern tec
... Show MoreObjective: To find out the relationship between vaginal bleeding during third trimester and pregnancy outcomes. Methodology: A purposive sample is "Non-probability" of (100) women who had diagnostic vaginal bleeding during third trimester (27-40wk) of pregnancy, and who visited the Bint Al-Huda Hospital for the period from 15th Feb. to 17th May 2015.Validity and reliability of questionnaire are determined through pilot study. Descriptive and inferential statistical procedures were used to analyze the data, and the data were collected by using interview technique, constructed questionnaire has been desig
Research Summary
The research revolves around the collection of pending hadiths on Abdullah bin Amr bin Al-Aas, may God be pleased with them, and it is required in these hadiths that they be among those in which there is no room for diligence, such as telling about unseen matters, signs of the Hour, or a statement of virtue and reward for obedience, or punishment for disobedience.
The research consists of an introduction, two topics, and a conclusion of the first topic in the translation of Abdullah bin Amr bin Al-Aas, and the second topic, the pending hadiths of Abdullah bin Amr bin Al-Aas, may God be pleased with them, in which there is no room for diligence in collecting and studying
At the end of this rese