The husband’s discipline of his wife is a right prescribed by the Sharia, but it is conditioned discipline with conditions that make this discipline intended to preserve the family institution from disintegration and scattering, so the Islamic Sharia entrusted the husband, the guardian of the family, with the task of disciplining the disobedient and disobedient wife and deviating from the family’s values and constants of mutual respect and obedience in what is good. And a sense of responsibility. This discipline goes through three sequential stages, starting with exhortation and dialogue, passing through abandonment in the beds, and ending with beating. As for the sermon, it is a quiet dialogue followed by a threat of abandonment. As for desertion, it is desertion, either verbally or desertion from sexual intercourse, and desertion is only in the marital bed. As for the beating, it is a light, harmless beating, and it may be described as a moral and psychological beating. It is intended exclusively for reform, so it is not permissible to resort to any means of discipline unless it is intended to return the wife to the institution of the family and to live together in a decent life based on affection and respect. The Iraqi legislator adopted the opinion of Islamic jurisprudence in the Iraqi Penal Code and made discipline a right of the husband in Article 41 thereof. As for the legislator in the Kurdistan region, the wife was excluded from the discipline clause. It seems that what the legislator followed in the Iraqi Penal Code is more likely.
The mutagenic effect of some crucifers widely consumed Lepiduim sativum (Garden cress) and Arugula (Eruca sativa) was studied in comparison to carrot (Daucus carota), using bacterial mutagenic system composed of three bacterial isolates; (Bacillus spp)G3 (Arthrobacter spp)G12, and (Brevibacterium spp)G27 ,. Treatment of isolates with plant extracts led to reduction in survival fraction (Sx)at different levels except that Aurgula extract did not show any inhibitory effect in isolates G12 and G27. Crucifers extracts induced streptomycin resistant mutants in G12 at higher level than G3 , but not in G27. No resistance to rifimpacin was detected in all isolates.
In this paper, a single link flexible joint robot is used to evaluate a tracking trajectory control and vibration reduction by a super-twisting integral sliding mode (ST-ISMC). Normally, the system with joint flexibility has inevitably some uncertainties and external disturbances. In conventional sliding mode control, the robustness property is not guaranteed during the reaching phase. This disadvantage is addressed by applying ISMC that eliminates a reaching phase to ensure the robustness from the beginning of a process. To design this controller, the linear quadratic regulator (LQR) controller is first designed as the nominal control to decide a desired performance for both tracking and vibration responses. Subsequently, discontinuous con
... Show MoreThe current paper aims to identify potential factors associated with employees’ intentions to leave information and communication technology companies in Iraq. There is evident variability in the literature regarding these factors; hence, a factor analysis approach was employed to identify these factors within the surveyed environment. Due to the difficulty in precisely delineating the size of the research population, a purposive sampling method was employed to reach an appropriate number of respondents within the aforementioned companies. A total of 288 employees responded to the survey conducted via Google Forms. The test results revealed the presence of five primary factors associated with employees’ intentions to leave, name
... Show MoreAs contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o
... Show MoreInundation floodingmap aimedto find outearly warningsto avoidenvironmental damageandhumanin terms of theheight ofthe wave ofwater, speed time arrival, effects of inundation sideanddepth of the water/ distanceand reduce the impact of the flood wave after obtaining the process of collapse of the dam in the lower part of the river to the dam area. The study has been using a numerical model one-dimensional depends on the development of equations (Saint-Venant) so that parts of the river, any river channel main banks of the right and left treated as separate parts, that’s the difference in the characteristics of the hydraulic and engineering, along the line of the flow will take into account in each section of the sections and flow in the riv
... Show MoreBackground; Neonatal period is a very vulnerable period of life due to many problems, In spite of advances in perinatal and neonatal care still, the mortality rate of neonate high especially in developing country The World Health Organization estimates that globally four million neonatal deaths per year, Developing countries account for around 99% of the neonatal mortality in the world, In Iraq. Neonatal mortality rate about 19 per 1000 live births which represent 56% of child death below 5 years age in 2012. .
Objectives The aims of the study were to determine the institutional new-born case fatality rate and the cause of admission and death in the neonatal care unit.
Method; Across-section study was carried out of the Neonatal Ca
The current research seeks to identify mono-multi Vision and its relation to the psychological rebellion and personality traits of university students. To achieve this aim, the researcher has followed all the procedures of the descriptive correlational approach, as it is the closest approach to the objectives of the current research. The researcher has determined his research community for Baghdad University students for the academic year 2019-2020. As for the research sample, it was chosen by the random stratified method with a sample of (500) male and female students. In order to collect data from the research sample, the researcher adopted a mono-multi-dimensional scale
(Othman, 2007), the researcher designed a psychological r
... Show MoreThis research aims at identifying the level of Moral Awareness and the level of Authoritarian Parenting Style of Secondary School Students in Baghdad. Additionally, the study seeks to identify the significant difference between these two variables in term of gender (male-female), as well as the correlation between Moral Awareness and Authoritarian Parenting Style. To do this, the researchers have adopted the scale of moral awareness prepared by the (Assl 2014), which the number of its items was finalized of (28) items. As for the Authoritarian Parenting Style scale, the researcher designed a questionnaire of (22) items as the number of its finalized form. The two instruments were applied on a sample of (140) male and female Students who
... Show MoreDetecting and subtracting the Motion objects from backgrounds is one of the most important areas. The development of cameras and their widespread use in most areas of security, surveillance, and others made face this problem. The difficulty of this area is unstable in the classification of the pixels (foreground or background). This paper proposed a suggested background subtraction algorithm based on the histogram. The classification threshold is adaptively calculated according to many tests. The performance of the proposed algorithms was compared with state-of-the-art methods in complex dynamic scenes.
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More