The present study is concerned with the writer's ideologies towards violence against women. The study focuses on analyzing violence against women in English novel to see the extent the writers are being affected and influenced by their genders. It also focuses on showing to what extent the writer's ideologies are reflected in their works. Gender influences social groups ideologies; therefore, when a writer discusses an issue that concerns the other gender, they will be either subjective or objective depending on the degree of influence, i.e., gender has influenced their thoughts as well as behaviors. A single fact may be presented differently by different writers depending on the range of affectedness by ideologies. The study aims to uncover the hidden gender-based ideologies by analyzing the discursive structure of a novel based on Van Dijk's model (2000) of ideology and racism. The selected novel is based on discussing violence against women. The study will later on reveal the real writer’s gender-based ideologies and whether the writer is a feminist or an anti-feminist? Or Is he prejudiced? Or Is he biased?
Abstract
Objectives: this study aims to: (1). Assess self-esteem level and academic achievement for students of nursing colleges in southern Iraq. (2). Determine the relationship between levels of self-esteem and academic achievement of the student in the first semester. (3). Identify differences of self-esteem with gender and different age groups.
Methodology: a sample of (426 students) was purposively selected then collected by using a questionnaire which consisted of: I- Sociodemographic characteristics for assessing some important aspects of students, II- Rosenberg's Self-Esteem Scale (RSES) III- Iraq Grading Scale for assessing student achievement. Finally statistical analysis (SPSS) for data processing.
Results: study resu
The research is Concerned the Relationship between Self Management which is a modern administrative term and its dimensions "Self Control, Trust, and Conscientiousness" with the Hardiness and its dimensions "Challenge, Commitment, and Control". And the impact of the first variable on the second in The Hospital of Alshaheed Gaze Alharery.
The Questionnaire used and distributed on sample (60) Persons, contain from (40) Doctor, and (20) Employees from the total society (103).
The statistical methods have been used for testing the hypothesis is the mean, standard deviation correlation coefficient.
The resea
... Show MoreThe research study includes shedding light on the sas dance in Iraq, as it is one of the popular legacies that are rich in the Mesopotamian civilization and because of the different practices it has in the different occasions on which these dances are held. Which is one of the kinetic arts widespread among the classes of Iraqi society. The researcher explained its features and artistic content that characterizes Iraqi music. The (methodological framework) reviewed the justification, importance and purpose of the research, and the limits of the research that included the (National Troupe of Folk Art) as a human limit to discover the artistic methods of the Sas dance and then define the terms of the search. The "theoretical framework" cont
... Show MoreAbstract As the United Nations approaches its 70th anniversary, the world is going through the most severe accumulation of serious international security failures in recent memory, challenging the UN Security Council’s ability to address them effectively. Over the past four years, crises in Libya, Syria and Ukraine have precipitated a worrisome erosion of great power relations that has complicated Security Council decision making on a number of trouble spots. Its inability to devise consensus responses to the escalating civil war in Syria has been particularly troubling, resulting in the regional spill over into Iraq and the emergence of Islamic State as a new threat to peace in the region and beyond. Meanwhile, the UN’s often under
... Show MoreThe present study was conducted to investigate the antimicrobial activity of the hot water and the hot ethanolic extracts of Thuja orientalis against some pathogenic microorganisms (Staphylococcus aureus, Pseudomonas aeruginosa, Eschericha coli, Proteus mirrablis, Salmonilla typhi, Klebsiella pneumoniae, Bacillus cereus, Bacillus subtilus, Acinobacter, Staphylococcus epidermidis and Candida albicans). Results showed that both the water and alcoholic extracts of this plant exert marked inhibitory effect against all the bacterial isolates and yeast and at different ratio, and it was shown that ethanolic extract was more effective in microbial inhibition than the water extract. Maximum inhibition (16 mm) was recorded against Staphylococcus aur
... Show MoreIn vitro antifungal susceptibility test of itraconazole was carried out against 38 isolates from nails, skin, oral cavity, vagina and wounds, This study was done in Ramadi Teaching Hospital in period from January to August 2010. According to the National Committee for Clinical Laboratory Standard (NCCLS ) M 27- A by using the broth dilution method. Inoculum size was 1-5X103 CFU/ ml, while final concentrations of itraconazole ranged from 0.025 – 6.4 μg / ml by using RPMI – 1640 broth media and the fungus was incubated at 35 oC. No resistant stain was recorded. MIC ranged from 0.05 – 6.4 μg / ml and the Mean ± SEM was 0.89 ± 0.28. MIC for nail isolates was 0.05 –
... Show MoreIn recent years, infectious diseases are increasingly being encountered in clinical settings. Due to the development of antibiotic resistance and the outbreak of these diseases caused by resistant pathogenic bacteria, the pharmaceutical companies and the researchers are now searching for new unconventional antibacterial agents. Recently, in this field, the application of nanoparticles is an emerging area of nanoscience and nanotechnology. For this reason, nanotechnology has a great deal of attention from the scientific community and may provide solutions to technological and environmental challenges. A common feature that these nanoparticles exhibit their antimicrobial behavior against pathogenic bacteria. In this report, we evaluate
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More