The general crisis of research methods in the social sciences
Research methodology: philosophy and techniques, founded by philosophers and applied by scientists, and no accurate application of techniques except with a deep understanding of philosophy, as a prerequisite. This fact is almost completely absent from the Iraqi and Arab academic mentality. This constituted one of the dimensions of the double crisis - theoretical and applied - of research methods in the social sciences. As first, there is no philosophy of science, neither as an independent material nor as an introductory subject, but not even an oral confirmation. Secondly, the advancement of quantitative research methods are presented without a background philosophy, as solo methodologies studied in a simple way.
Thirdly, institutional dogmatism does not understand and accept only the quantitative methods familiar and prevalent, within a context of "foundational ignorance". Fourthly, administrative research, not the scientific one, based on the outward mentality, and the external motivation that have been formed as a result of long decades of scraping of the scientific mind and as a dedication to authoritarian, opportunistic and formal cultures. All these have cast the researcher away from his professionalism and his cognitive and social interests, in order to turn him into a searcher for an “academic certificate’ rather than a “knowledge”; a searcher for an “interest” not “value.”
ABSTRACT
Agricultural production, food security and safety, public health animal welfare, access to markets and alleviation of rural poverty have been achieved by controlling on veterinary services to prevent animal disease. World organization for animal health guidelines focus on controlling of animal disease which depends on good governance and veterinary services quality. The aim of veterinary services is controlling and preventing animal disease some of other aspects; it's responsibility of early detection, rapid response to outbreaks of emerging or re-emerging animal disease, optimizing quality and effectiveness of disease
... Show MoreColorectal cancer (CRC), the second most fatal cancer and the 3rd most common cancer is expected to cause 0.9 million deaths globally in 2025. Carcinoembryonic antigen (CEA) is currently used in the follow-up of patients with colorectal cancer, and in this study, we are trying to find a better marker than CEA in following up on patients' health and knowing the effectiveness of the treatment used and as a diagnostic marker for colorectal cancer. To determine the significance of Cancer antigen 72-4 (CA72-4) as a prognosis predictor in patients with colorectal cancer, compare its prognostic validity to the CEA biomarker. this case-control study includes (150) participants, 100 patients (59 males and 41 females), and 50 healthy controls
... Show MoreThe densities and visconsities of solutions of poly(vinyl alcohol)(PVA) molccuar weight (14)kg.mol-1in water up to 0.035%mol.kg-1
Three-dimensional cavity was investigated numerical in the current study filled with porous medium from a saturated fluid. The problem configuration consists of two insulated bottom and right wall and left vertical wall maintained at constant temperatures at variable locations, using two discretized heaters. The porous cavity fluid motion was represented by the momentum equation generalized model. The present investigation thermophysical parameters included the local thermal equilibrium condition. The isotherms and streamlines was used to examine energy transport and momentum. The meaning of changing parameters on the established average Nusselt number, temperature and velocity distribution are highlighted and discussed.
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More