Preferred Language
Articles
/
jcoeduw-72
Analytical study of the images and roles of women and men in the books of the Arabic language at the elementary level
...Show More Authors

Importance of the research:
The importance of any educational or scientific research through its intellectual arena of facts supply the individual and society, Supports Knowledge and Science Group, which raised will be locked in these topics in the future.
This research seeks to shed light on the image and the role of women and men in the books of the Arabic language in primary education (primary), To illustrate the negative effects of the phenomenon of sexism in textbooks, And its negative impact on emerging, And stay away as much as possible about the distinction between the sexes in the roles and qualities in textbooks traditional stereotypes and remove that put both sexes templates hinder the development of the individual and the limit of its capabilities and ambitions, And impede the march and progress of society. (Hormuz.1988).
The difference between the sexes is based on a patriarchal culture and the world of organized by men for men is the reason for this gender discrimination, Despite the progress made by women in the fields of life. (Lutfi, 1988).
If we go back to the real reason for the gender discrimination we are seeing is due to the composition of the social system in the Arab countries are biased stereotypes, It is necessary to point out that the roles played by women has undergone many profound changes as a result of the rapid cultural change in the present era. (Shriha'a, 1989).
Research Objectives:
The current research aims to:
1- The role and image of women and men in the Arabic language books in primary education in the Republic of Iraq characterization
2-Identification of the positive roles of women in these books.
3-Identify negative roles that emerged by women.
Search Procedures
Sample
Arabic language teachers in primary schools affiliated to the Directorate of Educational Karkh third place in Baghdad, Where was their number (166) teacher.
Search tool
Was drafted resolution for the study analysis of reading books at the elementary level, Where the number of questions (35) Question arranged within three alternatives respectively [ Ok, I dunno, Is Ok], Mark has been under what is appropriate of the three alternatives at the discretion of the Arabic language teacher verified or unverified.
Statistical methods
1. The questions were arranged in descending order according to the resolution percentile weight for each question where
2. The number of occurrences of unloading answer at every level of the three resolution levels.
3. dish Kay law for each question in the questionnaire to calculate the calculated value and compare the value tabular.
Search Results
Through content analysis of reading books at the elementary level and compatibility with the results of the questionnaire, The results can be summarized as follows:
- There are significant differences between the books directed toward males and females and their orientation towards the percentages were clearest evidence of this.
- There is a difference and disparity between male and female attendance at these textbooks in favor of men as Danh and Statistics.- The results showed a significant impact practiced textbooks enshrining sexism process through traditional stereotypical references inherited impose values and standards of society and culture.
- There is a disparity between the number of authors and works, technicians and professionals, scientists and processes, in these books for the benefit of men.
- There is a disparity between the number of poets and poets of poems books in favor of men.
- There is a disparity in the female and male audience, As a secondary female characters, The male pivotal and key often in favor of men.
- There is a disparity between the images and fees earmarked for females and males, The difference is also in favor of men.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 28 2019
Journal Name
Soft Computing
Bio-inspired multi-objective algorithms for connected set K-covers problem in wireless sensor networks
...Show More Authors

Scopus (13)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sun Sep 03 2017
Journal Name
Baghdad Science Journal
Gravity Field Interpretation for Major Fault Depth Detection in a Region Located SW- Qa’im / Iraq
...Show More Authors

This research deals with the qualitative and quantitative interpretation of Bouguer gravity anomaly data for a region located to the SW of Qa’im City within Anbar province by using 2D- mapping methods. The gravity residual field obtained graphically by subtracting the Regional Gravity values from the values of the total Bouguer anomaly. The residual gravity field processed in order to reduce noise by applying the gradient operator and 1st directional derivatives filtering. This was helpful in assigning the locations of sudden variation in Gravity values. Such variations may be produced by subsurface faults, fractures, cavities or subsurface facies lateral variations limits. A major fault was predicted to extend with the direction NE-

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Mon May 01 2023
Journal Name
Kurdish Studies
Establishing Proof Against Those Who Claimed to Contradict Al-Noman in Matters Such as Sales
...Show More Authors

Jurisprudential disagreements are a significant source of a vast jurisprudential wealth. Among the manifestations of these disagreements are scholarly critiques raised by some scholars against others, claiming their divergence from the legal evidence or established principles for deducing legal rulings. One such critique is presented by the narrator scholar Abu Bakr Ibn Abi Shaybah, may Allah have mercy on him, directed towards Abu Hanifah al-Nu‘man, may Allah have mercy on him. In his compilation, Ibn Abi Shaybah cited numerous hadiths and traditions that he considered conflicting with the judgments as perceived by Imam Abu Hanifah, may Allah have mercy on him. These issues cover various branches of jurisprudence, including worship, sale

... Show More
Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Immiscible CO2-Assisted Gravity Drainage Process for Enhancing Oil Recovery in Bottom Water Drive reservoir
...Show More Authors

The CO2-Assisted Gravity Drainage process (GAGD) has been introduced to become one of the mostinfluential process to enhance oil recovery (EOR) methods in both secondary and tertiary recovery through immiscibleand miscible mode. Its advantages came from the ability of this process to provide gravity-stable oil displacement forenhancing oil recovery. Vertical injectors for CO2 gas have been placed at the crest of the pay zone to form a gas capwhich drain the oil towards the horizontal producing oil wells located above the oil-water-contact. The advantage ofhorizontal well is to provide big drainage area and small pressure drawdown due to the long penetration. Manysimulation and physical models of CO2-AGD process have been implemented

... Show More
Publication Date
Fri Jan 01 2021
Journal Name
Aip Conference Proceedings
Highly-charged EDTA-2Na salt as a novel draw solution in pressure-retarded Osmosis process
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (8)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Jun 12 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Using Phone Calls to Promote Community Pharmacist Counselling during COVID-19 Pandemic in Baghdad, Iraq
...Show More Authors

Drug consultation is an important part of pharmaceutical care. mobile phone call or text message can serve as an easy, effective, and implementable alternative to improving medication adherence and clinical outcomes by providing the information needed significantly for people with chronic illnesses like diabetes and hypertension particularly during pandemics like COVID-19 pandemic.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Applied Energy
Melting enhancement in triplex-tube latent heat energy storage system using nanoparticles-metal foam combination
...Show More Authors

View Publication
Scopus (304)
Crossref (304)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Digital Communications And Networks
Dynamic channel estimation-aware routing protocol in mobile cognitive radio networks for smart IIoT applications
...Show More Authors

View Publication
Scopus (17)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (6)
Crossref (6)
Scopus Crossref