The general crisis of research methods in the social sciences
Research methodology: philosophy and techniques, founded by philosophers and applied by scientists, and no accurate application of techniques except with a deep understanding of philosophy, as a prerequisite. This fact is almost completely absent from the Iraqi and Arab academic mentality. This constituted one of the dimensions of the double crisis - theoretical and applied - of research methods in the social sciences. As first, there is no philosophy of science, neither as an independent material nor as an introductory subject, but not even an oral confirmation. Secondly, the advancement of quantitative research methods are presented without a background philosophy, as solo methodologies studied in a simple way.
Thirdly, institutional dogmatism does not understand and accept only the quantitative methods familiar and prevalent, within a context of "foundational ignorance". Fourthly, administrative research, not the scientific one, based on the outward mentality, and the external motivation that have been formed as a result of long decades of scraping of the scientific mind and as a dedication to authoritarian, opportunistic and formal cultures. All these have cast the researcher away from his professionalism and his cognitive and social interests, in order to turn him into a searcher for an “academic certificate’ rather than a “knowledge”; a searcher for an “interest” not “value.”
The research seeks to identify the proposed scenarios to predict and ward off monetary credit risks that the bank is exposed to in the future, using the banking stress tests model, and showing their impact on capital adequacy and profitability ratio,To achieve this purpose, Sumer Commercial Bank was taken as a case study, and mathematical equations were used to extract the results. Low percentage of profits and returns, strictness in the process of granting credit and financing operations in order to reduce credit risks.
Bumpiness in the atmosphere is the vertical movement of air, whether
upward or downward movement and the bumpiness is accompanied by areas
of unrest in the air and wind. And contribute to each of the coups thermal
fronts, wind, wind and thunderstorms. Moreover, bumpiness is net of the
reasons that lead to circumstances is appropriate to cut the wind, and this
contributes to the formation of bumpiness in the atmosphere. The study found
that the noon of the times, which is expected to occur where clear-air
bumpiness during flights because of the warmth of the earth's surface. The
study found increased incidence of air hole during the summer, especially
July, due to increased incidence of coup surface, while the s
Metaphor has been occupied first place among eloquent methods to build metaphors;
poetry with the latter becomes senseless thing. Metaphor is necessary part of energy that
sustains the poetry. Sentence of metaphor regarded more eloquent than the reality since it
does not conduct directly to the meaning , but rather get to it indirectly. Metaphor is
considered one of the most tools for the poet since it is a means of expression about his
sensation and feelings . Andalus paid concerns over metaphors as that being incited by their
country beauty and nature. The poet might resort to contradiction as to picture contraries
within himself.
Through pictures of contradictions depicted by the poets , it has explained that t
The research aims to know the reverberation of the the electronica news bulletin of the ministry of higher education and scientific research in the newspapers of: (AL-Taakhi, AL-Zaman, ALAdala,AL-Sabah and Baghdad) for period from 2nd October 2011 to 1st November 2011 to explain its activity and advantage for the other newspapers and to show the importance which the newspapers showed for the study of the news subject in the bulletin, as well as,to show the proportional differences in which the newspapers interested in the subjects of the published news, and to reach to the results which lead us to good conclusions for the service of decision owner and open new horizons for the researchers to expanding in the s
... Show MoreThe problem lies in the main research Where the site of this interpretation of the books of interpretation and what is new and how?
The objectives of this research Vjat to give a quick overview of Sheikh Kenon and the qualifications that made him interpreter, as the goal of the research to reveal the method of Sheikh Kenon highlighting what he has and what is new and show.
The researcher used the inductive method to read the whole book and the comparative approach to compare it with others. He also used the critical method to distinguish between the positions of strength and weakness in the book. The most important results are as follows: :
1 - Sheikh Abdullah Kenon language writer familiar with many sciences, such as jurisprude
Background: In young adults, multiple sclerosis is a prevalent chronic inflammatory demyelinating condition. It is characterized by white matter affection, but many individuals also have significant gray matter involvement. A double-inversion recovery pulse (DIR) pattern was recently proposed to improve the visibility of multiple sclerosis lesions. Objective: To find out how well a DIR sequence, FLAIR, and T2-weighted pulse sequences can find MS lesions in the supratentorial and infratentorial regions. Methods: A total of 37 patients with established diagnoses of multiple sclerosis were included in this cross-sectional study. Brain MRI was done using double inversion recovery, T2, and FLAIR sequences. The number of lesions was count
... Show MoreBackground: Orthodontic mini-implants are increasingly used in orthodontics and the bone density is a very important factor in stabilization and success of mini-implant. The aim of this study was to observe the relationship among maximum bite force (MBF); body mass index (BMI); face width, height and type; and bone density in an attempt to predict bone density from these variables to eliminate the need for CT scan which have a highly hazard on patient. Materials and Methods: Computed tomographic (CT) images were obtained for 70 patients (24 males and 46 females) with age range 18-30 years. The maxillary and mandibular buccal cortical and cancellous bone densities were measured between 2nd premolar and 1st molar at two levels from the alveol
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.
Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show More