The study aims to identify the level of modesty and self-assertiveness among Tikrit university’s students in regard with students’ gender and major (scientific, human studies), and to identify the correlation between modesty trait and self-assertiveness of students. To this end, the researcher has designed a scale to measure modesty that consisted of four-domains (decency, avoiding of unattractive, pang of conscience, and apprehension). Moreover, the researcher adopted a scale of self-assertiveness that designed by (shawki, 1998). The sample included (600) student on first-stage at the university of Tikrit. The results revealed that students have a high level of modesty and self-assertiveness; there is a correlation between modesty trait and self-assertiveness; female has a high level of modesty than male do. Modesty showed a high level at scientific studies than that of human studies, and finally, gender showed no significant difference in self-assertiveness, but self-assertiveness showed significant difference in regard of scientific studies
The concept of decolonization of trauma has intrigued researchers for years due to its prolonged effect on personal and cultural levels. The process of intellectual decolonization involves defensive survival mechanisms, such as cultural rituals using traditional practices, nostalgic dialogues that idealize memories and recollections, and conversations about identity to navigate postcolonial trauma displacement. Symbolic connections evoke strong emotional responses, bridging the gap between the characters‘ physical dislocation and their imaginary homeland. Cocooning identity represents a space where a multidimensional self emerges—one that holds the victim of trauma, the survivor who endures, and the narrator, who constructs an idealized
... Show MoreCultural and identity scars have been engraved in the body of ethnic minority of Muslims in America due to the bloody attacks of 9/11. These events have created thus traumatic experiences on the party who witnessed the events at close and the people on whom the blame is conclusively directed, Muslim Americans. For Americans, the attacks resulted in a proud reassertion of the national virtue and communal integrity from which Muslim Americans were excluded. This reassertion is accompanied for Muslims by a reconstruction of a cultural identity away from their origin homeland and under pressures and prejudices that made the process of reconstruction to be severely challenging. Accordingly, the challenge needed to be portrayed to overcome the d
... Show MoreThis study aims to conduct an exhaustive comparison between the performance of human translators and artificial intelligence-powered machine translation systems, specifically examining the top three systems: Spider-AI, Metacate, and DeepL. A variety of texts from distinct categories were evaluated to gain a profound understanding of the qualitative differences, as well as the strengths and weaknesses, between human and machine translations. The results demonstrated that human translation significantly outperforms machine translation, with larger gaps in literary texts and texts characterized by high linguistic complexity. However, the performance of machine translation systems, particularly DeepL, has improved and in some contexts
... Show MoreThis study was aimed to evaluate atotal phenolic content, antibacterial activity, and antioxidant activity of M. communis callus extracts were evaluated. Callus induction in general Murashige and Skoog (MS) media is completed by the Benzil adenine's unique knowledge of callus formation. A well diffusion experiment was used to examine antibacterial interest in Staphylococcus aureus, Escherichia coli, Klebsiella pneumonia, and Pseudomonas aeruginosa. The DPPH radical scavenging activity test was used to measure antioxidant activity. FTIR and HPLC have been used to pinpoint the presence of polyphenol compounds in calluses. The total phenol content of plant leaves extract (0.1, 0.5, and 1) mg/ml was 42.12, 94.08, and 189 mg of Gallic ac
... Show MoreAn intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co
... Show MoreData mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the most effective parameter, particularly when Age<49.5. Whereas Ki67 appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu
... Show MoreThe spectrum of clinical efficacy of Methotrexate (MTX) is broad in that MTX is used in the treatment of certain cancers, severe psoriasis and rheumatoid arthritis.Various mechanisms by which cancer cells grown in tissue culture become resistant to anticancer drugs. The use of multiple drugs with different mechanisms of entry into cells and different cellular targets allows for effective chemotherapy and high cure rates. In an efforts to develop effective strategies that increase the therapeutic potential of anticancer drugs with less systemic toxicity ,are being directed towards the investigation of dietary supplements and other phytotherapeutic agents for their synergistic efficacy in combination with anticancer drugs. A pr
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreA simple, sensitive and accurate spectrophotometric method has been developed for the determination of salbutamol sulphate (SAB) and isoxsuprine hydrochloride (ISX) in pure and pharmaceutical dosage. The method involved oxidation of (SAB) and (ISX) with a known excess of N-bromosuccinamid in acidic medium, and subsequent occupation of unreacted oxidant in decolorization of Evans blue dye (EB). This, in the presence of SAB or ISX was rectilinear over the ranges 1.0-12.0, 1.0-11.0 µg/mL, with molar absorptivity 4.21×104 and 2.58×104 l.mol-1.cm-1 respectively. The developed method had been successfully applied for the determination of the studied drugs in their pharmaceutical dosage resulting i
... Show More