المرأة نصف المجتمع , وهي التي تلد النصف الاخر وتربيههكذا وصفها الحكماء ولا مسار لارتقاء أي بلد وتقدم أي شعب بدون الارتقاء بالمرأة, وبدون مشاركتها في مسارات التحول والتغيير, لكن المرأة مازالت تعاني من التمييز على أساس النوع , وتتعرض للعنف الجندري مما يشكل عائقا كبيرا امام مشاركتها الحقيقية والفعالة في قيادة دفة الحياة , والأخذ بها نحو عيش حياة طييبة كريمة. تؤكد الوثائق أن العنف القائم على النوع الاجتماعي من المشاكل الواسعة الانتشار فيما يخص حقوق الإنسان الدولية والصحة العامة، وأن التدخلاتلمنعه ومواجهته بطريقة مناسبة ,ومميزة ,وفعالة غير كافية في معظم بلدان العالم. ويزداد ويتجلى هذا النوع من العنف بإشكال مختلفة يتمثل بالاعتداء البدني, والجنسي, والنفسي عليها وكذلك جرائم الشرف احدى تمظهراته الكبيرة, والزواج القسري والمبكر ,والاتجار بالمرأة, وختان الاناث ,وسوء المعاملة والانقطاع عن التعليم. وقد شهد القرن الحالي انبثاق اتفاقياتدولية شارعة , تضمنت عددا من التدابير لحماية المرأة من العنف الجندري, وقد انبثقت من منظمة الامم المتحدة عدة قرارات , واعلانات للحد من العنف الجندري , ووضع العراق عدة تشريعات واستراتيجيات لحماية المرأة من العنف الجندري ,وعلى الرغم من كل الجهود الدولية وانعكاساتها على التشريعات العراقية الداخلية الا ان مشكلة العنف الجندري مازالت قائمة .
Language is an important means through which one can construct one's social world. Accordingly, the way we view ourselves and the world is basically formed by language use whereby identities, relations, and values are constructed and maintained. Most discourse analysts consider narrative not only the locus of construction and enactment of identity, but also a distinguished genre for its analysis.The present study is concerned with how identity can poetically be informed, hence exploring the way black poets use language when reflecting their identity and culture. The poem, right on: white america by the black American poetess Sonia Sanchez, is chosen to be analyzed based on Simpson's stylistic model (2004). In this model, the ana
... Show MoreThis research reviews the aesthetic variables that were founded according to (theatrical rehearsal) as one of the most important pillars on which the theatrical process is based, because of its necessity in developing theatrical art on several levels that helped the theatrical director in organizing his work, and this became clear through the research chapters represented in the first chapter (methodological framework) and the second chapter, which consisted of the first topic (the duality of watching / rehearsal) and the second topic (the applications of theatrical rehearsal in theatrical experiences), all the way to the third chapter (research procedures), which included the analysis of theatrical rehearsals (sharing on life), and the
... Show Moreعلى الرغم من إن الابداع والمبدعين وخصائصهم العقلية والشخصية تعد من المفاهيم المهمة والشائعة في الحياة بمجالاتها كافة، ففي الوقت الذي نجد فيه العديد من الدراسات والمقالات العربية والاجنبية التي تناولته بشكل او باخر، لكنها جميعها اعتمدت على المقياس الخاص بالتفكير الابداعي لمؤسسه الاول تورانس منذ عام (1967)، متجاهلة التغيير والتطور المعلوماتي ولا سيما في الانترنيت والحاسوب وما افرزه هذا من مفردات شاعت وتداول
... Show MoreIt may say that of difference towards a state that had witnessed the birth of modern party system in England ،and it appear a new case of organization and use ways effecting in general opinion through the election parties that had different in their ideology as Alweel party which dealt with religion related among its members with Buretan with its members participation understandings of free expression of their opinions trying to fight the control of Christ men in a time that Tory party was Enklikanian more than as it was loyalty one .
A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show Moreاطروحة ازمة كشمير واثرها على العلاقات الهندية - الباكستانية
This research deals with the case of the Iraqi joint-stock companies listed on the Iraq Stock Exchange study in terms of compliance with the requirements of IAS 33 "Earnings per share" and the research problem Alrtash concentrated in a statement the commitment of those companies the requirements of the International Standard 33, which may adversely affect the quality of financial reporting where and in particular the quality of accounting information and content of the primary and secondary characteristics make them be of interest to the decisions of its users, so the aim of this research to the statement of financial reporting earnings per share on the quality of financial reporting in listed shareholding in Iraq Stock Exchange
... Show MoreBrainstorming is one of the fundamental and necessary concepts for practising the auditing profession, as auditing standards encouraged the implementation of brainstorming sessions to reach reasonable assurance about the validity of the evidence and information obtained by the auditor to detect fraud, as the implementation of brainstorming sessions and the practice of professional suspicion during the audit process lead To increase the quality of auditing and thus raise the financial community's confidence in the auditing profession again after it was exposed to several crises that led to the financial community losing confidence in the auditing profession.
The research aims to explain the effect of brain
... Show MoreRecommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show More