Preferred Language
Articles
/
jperc-1161
Empowering Women in Palestinian Society from an Educational Perspective: an Analytical Study
...Show More Authors

The study aims to identify the concept of empowering women from the point of view of experts in the Palestinian society, specifically in Gaza, as well as to explore the foundations of their formation of this concept. Additionally, the study seeks to clarify the most important challenges facing the empowerment of women in Palestinian society. The study used the design of a grounded theory that seeks to build the theory through deep analysis of the data, as qualitative data were collected through holding two focus groups and six in-depth interviews with the study sample, who were selected by the method of targeted sampling. The sample included (16) individuals (9 female experts, 7 male experts) holding academic and community leadership positions. The results of the study showed that the concept of empowering women includes three dimensions related to enhancing women's self-confidence, developing capabilities of self-realization awareness of women about rights, and how to achieve these rights. The concept of empowering women relied on basic principles, the most important of which are: the Islamic religion, the culture of the society, the requirements of reality, and successful experiences. The empowerment of women in Palestinian society faces challenges, the most prominent of which is the negative side in the society’s culture and the complexities of the Palestinian reality.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 15 2017
Journal Name
Arab World English Journal
An Assessment of Iraqi EFL Learners’ Performance in Using Synonymy and Antonymy
...Show More Authors

The knowledge related with lexical items can be realized as including relations of meaning a cross words. Words that share a similarity of meaning are called to be synonymous, and words that share a contrary of meaning are called to be antonymous. Both of them are universal linguistic phenomenon that exist in terms of linguistic system of every language. The present study aims at finding out areas of difficulty that Iraqi EFL learners encounter in the use of synonymy and antonymy, both on the recognition and production levels. Also tries to detect the main reasons behind such difficulties. A diagnostic test of two parts, namely, recognition and production, is designed. The test is built to include two linguistic phenomenon which are: synony

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
5th Iet International Conference On Renewable Power Generation (rpg), 2016, London, Uk
Electrical Machine Design for use in an External Combustion Free Piston Engine
...Show More Authors

Scopus (4)
Crossref (8)
Scopus Crossref
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
The Directorship Vision in Epic Drama Shows " AWNI KROMI AS AN EXAMPLE"
...Show More Authors

View Publication
Crossref
Publication Date
Sun Mar 31 2024
Journal Name
Iraqi Geological Journal
Determination of Reservoir Rock Type in Sarvak Reservoir of an Iranian Oilfield
...Show More Authors

Integrated reservoir rock typing in carbonate reservoirs is a significant step in reservoir modelling. The key purpose of this study is the identification of integrated rock types in the Sarvak Formation of an Iranian oilfield. In this study, electrofacies (EFAC) analysis of the Sarvak reservoir was done in detail to determine the reservoir quality and rock types of the Sarvak Formation in the studied field. The core data and conventional petrophysical logs were used for rock typing. Some petrophysical logs such as porosity, sonic, neutron, density, and Photo electric factor were applied as input data for electrofacies analysis. Multi-Resolution Graph-Based Clustering was used among six approaches, resulting in four electrofacies af

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Jan 12 2022
Journal Name
Iraqi Journal Of Science
Propose an Efficient Face Recognition Model in WSN Based on Zak Transform
...Show More Authors

The need for a flexible and cost effective biometric security system is the inspired of this paper. Face recognition is a good contactless biometric and it is suitable and applicable for Wireless Sensor Network (WSN). Image processing and image communication is a challenges task in WSN due to the heavy processing and communication that reduce the life time of the network. This paper proposed a face recognition algorithm on WSN depending on the principles of the unique algorithm that hold the capacity of the network to the sink node and compress the communication data to 89.5%. An efficient hybrid method is introduced based upon the advantage of Zak transform to offprint the farthest different features of the face and Eigen face method to

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
An Investigation to the Abrasive Wear in Pipes Used for Oil Industry
...Show More Authors

The work reported in this study focusing on the abrasive wear behavior for three types of pipes used in oil industries (Carbone steel, Alloy steel and Stainless steel) using a wear apparatus for dry and wet tests, manufactured according to ASTM G65. Silica sand with
hardness (1000-1100) HV was used as abrasive material. The abrasive wear of these pipes has been measured experimentally by measuring the wear rate for each case under different sliding speeds, applied loads, and sand conditions (dry or wet). All tests have been conducted using sand of particle size (200-425) µm, ambient temperature of 34.5 °C and humidity 22% (Lab conditions).
The results show that the material loss due to abrasive wear increased monotonically with

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of The College Of Languages
The Multifunctional Morphemes in Kurdish Language the Morpheme Le as an example
...Show More Authors

Kurdish language multifunctional morphemes indicate the different functional morphological, syntactical, and semantic tasks of the morphemes. The present study discusses the multifunctional task of the Morpheme Le in Kurdish Language. The Morpheme Le has marginally been included in other studies, yet up to the present times, there has not been a research inclusively dedicated to thoroughly discuss and clarify its multifunctional aspects. The present study is divided into two chapters: Chapter one discusses the theoretical aspect of chapter two that is entirely concerned with the practical aspect of the morpheme Le. The first part of chapter one sheds light on the morphological aspect of the morpheme while part two discusses

... Show More
Preview PDF
Crossref
Publication Date
Thu Dec 30 2021
Journal Name
Iraqi Journal Of Science
Concealing a Secret Message in a Colour Image Using an Electronic Workbench
...Show More Authors

Steganography is the art of concealing security data in media, such as pictures, audio, video, text, and protocols. The objective of this paper is hiding a secret message in a colour image to prevent an attacker from accessing the message. This is important because more people use the Internet all the time and network connections are spread around the world. The hidden secret message uses two general algorithms that are embedded and extracted. This paper proposes a new algorithm to conceal a secret message in a colour image in LSB. This algorithm includes three phases: 1) dividing the colour image into a number of blocks, 2) concealing the secret message, and 3) transmitting the stego-image from the sender in a multiplexer network and re

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Iraqi Postgraduate Medical Journal
Can the automated pump be an alternative to tourniquet in knee arthroscopy ?
...Show More Authors

ABSTRACT: BACKGROUND: Arthroscopic knee surgeries are performed in very large numbers worldwide, and in spite of relatively low complication rate, but the total number is significant. Some of these complications are due to tourniquet use and can be serious. OBJECTIVE: Is to asses if automated pump (with or without) dilute epinephrine saline irrigation can replace the tourniquet use in soft tissue arthroscopic knee surgeries. PATIENTS AND METHODS: 36 patients (9 females 25 % and 27 males 75 %) were included in this prospective experimental nonrandomized study, and were necessitated soft tissue arthroscopic knee surgeries. Patients were divided into two groups, in group A (patients) tourniquet and automated pump were used. In group B (18 pati

... Show More
Preview PDF