Preferred Language
Articles
/
jcolang-447
Formation of Orientalist discourse, the tendency within the force, and metadata, and power.
...Show More Authors

Began research of the foundations of Orientalist discourse based on force and metadata and authority, and the possibility of turning the West's view of the East as if made ​​radical changes in the structure of the West or in a relationship of power and authority between it and the east. We have adopted in our paper on the research categories of Edward Said and visions in the field of Orientalism in general, and especially his book entitled the name of this area, not forgetting, or leave the expansion to other sources, a researcher in this field, to enrich the research.

We went to Orientalism as a concept and based cognitive, and the work of the Orientalist, and the meanings of Orientalism, which suggests Balastala which was characterized by managers of foreigners in the era of European colonialism in the nineteenth century and early twentieth century, and as a way of thinking texture discrimination existential and knowledge between East and West, and being a Western-style of domination on the east and reconstruction, and bullying him. It also discussed the issue of power and superiority and power in the discourse of Orientalism, as established hypotheses (circular) for the Middle leaning on Darwin's theory, the theory of human races to Renan based on arrogance and superiority, the balance of (scientific) developed by the West to study the peoples of Europe. So Orientalist discourse based on racial differentiation, mental and cultural cooperation between East and West.

They showed the relevance of knowledge to power, and the view of metadata, and the principle of Western power, so incurring the trouble of studying the West, especially the fantasy of the West remain distinct from and superior to it. We explained the difficulty of separation between the (Orientalist discourse) and (the field of international political thought).

And we came out that he may change the West's view Orientalist in the event of changes (radical) in the structure of the West, and perhaps in the event of changes in the balance of power, transmission and pinned down in the Middle of what Islam today a significant impact as a (power), which is extremely dangerous to the Christian West, Islam today is what constitutes balance (force) in the East, which significantly raises concerns Bank and the West only to incur the trouble of education or knowledge to tighten control to be able to prevent it constitute a danger to it again after the imposition of the wide dominance in the past.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 30 2021
Journal Name
Al-kindy College Medical Journal
Knowledge, Attitude, and Practice of Nurseries' Workers toward Infection Prevention among the Children
...Show More Authors

 

Background: Infections are common in the children attending daycare centers how act as predisposes to it. Hygienic interventions have a fundamental role in infection control and disease prevention in child care settings.

Objective: - To evaluate the knowledge, attitude, and practice of nurseries workers in infection prevention and control among the children.

Subjects and Methods: A cross-sectional study using the researcher-developed questionnaire validated by two experts and piloted and 100 nurseries-workers had participated in it.

Result: the mean age of participants was 37.5 years±12.1, (37%) aged 18-30 yrs, 58% married, and 57% with higher education, 54% of n

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu May 18 2023
Journal Name
College Of Islamic Sciences
a base The origin of permissive things And its impact on Islamic law
...Show More Authors

So I present in the hands of the honorable reader what God Almighty has made easy for me in terms of what I dealt with in the rule (the principle of permissive things) and what branches from it and what is related to it.
This research was divided into an introduction, a preface, three demands, and a conclusion.
The preamble is to explain the meaning of the rule in language and terminology and the definition of the legal rule and what is related to it. The first requirement is to explain the rule that we have in our hands and the words related to its text - and is it a fundamentalist or jurisprudential rule? .
As for the second requirement - in the difference of scholars and their opinions in whether the origin of things is permi

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
The Impact of Critical Reading on Viewers Understanding and Astatic Judgment at Artworks
...Show More Authors

This study reveals the impact of critical reading on viewers understanding and astatic judgment at artworks. And aims to find out the reasons and motives behind their issuing of these judgments towards artworks.
The study adopts the qualitative method as two pre and post interviews were conducted and analysed according to a thematic analysis method.
The results show that critical reading contributes to their understanding of the content of artworks and the message that the artist would like to convey to the recipient audience. and directs them towards the aesthetic judgment that is based on full understanding of the philosophical contents of the artwork, which, in turn, contributes to the development of artistic culture and a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Communications In Computer And Information Science
The Use of Biorthogonal Wavelet, 2D Polynomial and Quadtree to Compress Color Images
...Show More Authors

In this paper, a compression system with high synthetic architect is introduced, it is based on wavelet transform, polynomial representation and quadtree coding. The bio-orthogonal (tap 9/7) wavelet transform is used to decompose the image signal, and 2D polynomial representation is utilized to prune the existing high scale variation of image signal. Quantization with quadtree coding are followed by shift coding are applied to compress the detail band and the residue part of approximation subband. The test results indicate that the introduced system is simple and fast and it leads to better compression gain in comparison with the case of using first order polynomial approximation.

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Breakfast and its relationship to the curriculum daily diet of school-age children
...Show More Authors

The breakfast key components of good nutrition and a large proportion of pupils to Ataatnol her breakfast at home and increase the failure rate breakfast increase the child's age research aims to study the importance of breakfast and emphasize the need to contain aggregates of basic food and its relationship to the curriculum daily diet and its impact on the balance of proteins, fats in food daily as well as the effect of some relevant factors such as the mother's level of education and the number of family members and summarized the most important results in that the percentage of 15.6% Neglected children eating breakfast as well as afternoon that Almaah percentages of calories coming from protein and fat at breakfast .....

View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Revista Iberoamericana De Psicología Del Ejercicio Y El Deporte
THE IMPACT OF COVID-19 ON FOOTBALL CLUB STOCK INTEGRATION AND PORTFOLIO DIVERSIFICATION
...Show More Authors

Scopus (6)
Scopus
Publication Date
Mon Jan 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Toward a theoretical model of the terrorist personality and differentiation from psychopathic personality
...Show More Authors

The current theoretical research targeted to construct a model of terrorist personality and its differentiation from psychopathic personality . Several assumptions or theories of perspectives of psychopathic personality have been compared with the terrorist personality studies that concerned . The suggested theoretical  model is interrupting the terrorist personality . The conclusions , discussions are mentioned. Finally, recommendation is suggested .

View Publication Preview PDF
Publication Date
Wed Apr 01 2020
Journal Name
International Journal Of Pharmaceutical Research
Synthesis, Characterization, Study the Toxicity and Anticancer Activity of N,O-Chitosan Derivatives
...Show More Authors

View Publication Preview PDF
Scopus (12)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of The College Of Languages (jcl)
The Impact of Using PowerPoint presentation on EFL Students’ Attendance, Achievement, and Engagement
...Show More Authors

The current study examined the impact of using PowerPoint presentation on EFL student’s attendance, achievement and engagement. To achieve the aim of this study, three null hypotheses have been posed as follows: There is no statistically significant difference between the mean score of the experimental group attendance and that of the control one; there is no statistically significant difference between the mean score of the experimental group achievement and that of the control one, and there is no statistically significant difference between the mean score of the experimental group engagement and that of the control one. To verify a hypothesis, a sample of sixty students is chosen randomly from the third year, department of English,

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Engineering
State-of-the-Art in Data Integrity and Privacy-Preserving in Cloud Computing
...Show More Authors

Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to mak

... Show More
View Publication Preview PDF
Crossref (7)
Crossref