The research deals with the concept of stigma as one of the important phenomena that cast a shadow over the nature of the individual, his being and his personality through the inferior view with which he confronts in society, and (Sartors) indicates in this regard that stigma may lead to negative discrimination that leads to many defects, in terms of obtaining On care, poor health, service, and frequent setbacks that can damage self-esteem. The first roots of this phenomenon go back to the Greek civilization and what the Greeks used to burn and cut off some parts of the body and then announce to the nation that the bearer of this sign is a criminal. In addition to the Arab peoples living from setbacks that contributed to the exacerbation of this phenomenon, especially as we live in a society that has suffered a lot Wars and the consequences it has produced in the life of the individual and society, and given the privacy that theater enjoys in terms of communication and reception, this study came to shed light on the phenomenon of stigmatization. This study included the introduction of the research in which the researcher presented the research problem, its importance and its goal. Then the theoretical framework that dealt with a theoretical foundation for the research included two topics: the concept of stigma and the second: representations of stigma in the international theatrical text. The researcher came up with a set of indicators that I adopted in the analysis of the research sample model. After the analysis, the two researchers came up with a set of results, including: The study model was characterized by its presentation of social stigma through its statement of the individuals' dissatisfaction and ridicule of the Sultan's personality as a slave rather than a free person, which constituted a kind of social lack of acceptance and caused a danger in the issue of continuing the ruling
In the Name of God, the Most Gracious, the Most Merciful
Praise be to God, who taught the pen anthropology unless he knows, and peace and blessings be upon the master of bullying, and the imam of the eloquent Prophet Muhammad, the sincere and faithful, and his family and companions as a whole and whoever followed him to the Day of Judgment. And after:
The science of grammar is among the most important of all language sciences at all, if not the most important of its sciences, due to the multiplicity of its doctrines and schools, the diversity of its methods, its phenomena and subjects, as well as the connection of this science with the most honorable languages,
ackground: Escherichia coli is one of the most
important bacterial pathogen that can cause several
disease to human being . In our study we try to
investigate the sensitivity resistance pattern of
Escherichia coli against three antibiotics ( Amikacin,
Nalidixic acid and Cephalexin).
Methods: For this purpose we collected 51 clinical
isolates of Escherichia coli from stool and urine of
outpatient and inpatient patients from different wards
of AL-SADER Teaching Hospital in AL-NAJAF
AL-ASHRAf, IRAQ, and tested by culture and
sensitivity test .
Results: The results appeared that Amikacin show
the highest percentage of sensitivity ( 66.66 % ) ,
while Cephalexin show the lowest percentage of
sensiti
Background: Educational environment is one of the most important determinants of an effective curriculum. Students' perceptions of their educational environment have a significant impact on their behavior and academic progress. Objective: 1. To identify students’ perception to the educational environment.2. To identify any gender or class level differences in the students’ perception.Type of the study: This is a descriptive cross-sectional studyMethodology: The study was carried out on convenient sample of 150 students of 2nd and 5th grade. This study was done in Al Kindy Medical College, Baghdad, Iraq and conducted during the period from the 1st of October 2013 till the end of March 2014, by using DREEM questionnaire a validated uni
... Show MoreThe study seeks to identify e-governance requirements in human resources management, which are (administrative requirements, technical, human, financial, and security) which is a new style differs from the traditional management pattern, where work depends on multiple forms and methods of Tools, (e. g. computers and various electronic software), by relying on powerful information systems that help to make management decisions as quickly and less effortless and less expensive to keep up with the tremendous technological advancements in the field of information and communication technology revolution.
The sample included 132 Person who constitute a position (Director General, assistant Director General, section managers and d
... Show MoreCoronary artery disease (CAD) is a major health concern and leading of death in individuals with type 2 diabetes mellitus (T2DM). Glutathione S – Transferase(GST) are known for their broad range of detoxification and in the metabolism of xenobiotics . The role of functional variants of these genes in the development of various disorder is proven. We investigated the possible role of these variants in the development of CAD in T2DM patients. In this case – control study a total of 60 patients (T2DM = 30 ; T2DM – CAD = 30) and 30 controls were included. Serum lipid profiles were measured and DNA was extracted from the blood samples. Multiplex PCR for GSTT1/M1 (present / null) polymorphism, were performed for genotyping of study pa
... Show MoreAugmented reality technology is a modern technique used in all fields, including: medicine, engineering and education, and has received attention from officials in the educational process at present; The focus of this research is on the degree of use of augmented reality among field experience students in the project's optimal investment program for teaching staff and their difficulties, applied to a sample of 75 students, through a questionnaire prepared by the researcher as a tool to determine the degree of use, as well as difficulties. The researcher addressed the subject through two main axes to determine the degree of use, as well as the difficulties preventing teachers and learners from using this technique. The results of the rese
... Show MoreThe developments and transformations taking place in the era and the growth of knowledge economies and communication technology led this development to compel higher education institutions in Iraq to reconsider their objectives to keep pace with development. And one of the most important tools of development was the application of e-learning standards and its long-term impact on the performance of the educational institution. Performance auditing plays an important role in verifying the extent to which these institutions have implemented their activities and programs that auditing performance by adopting e-learning standards helps the institutions’ management by providing appropriate information on the extent to which they achieve thei
... Show MoreThis research sheds light on the contributions of a group of scientific Kurdish scholars in the seventh and eighth Hijri centuries, who devoted themselves to serving science with the bad political and economic conditions at the time, and the research pointed to the flowering of science and how students travel in order to provide them with science, obtain a scientific certificate, then take up The research efforts of the scholars in the two Hijri century mentioned in the science of the Qur’an, whether in the field of recitations, intonation or interpretation, and the research ends with a conclusion in which I mentioned the most important conclusions reached in this research.
The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show More