This paper delves into the significant role played by local social and traditional structures in shaping Traditional Community Tenure (TCT) within Iraqi Land Tenure Legislation (ILTR), and examines their impact on gender inequalities, with a specific focus on women's land tenure rights. The methodological approach employed in this study identified the sources of barriers to gender equality within TCT as outlined in ILTR at two different bilateral levels, with input obtained from key stakeholders in a selected city in Iraq. The case study survey encompassed three districts, which served as local layers within the historic sectors of the Iraqi city of Al-Nasiriya. the study employed quantitative methods, including a household surveyو within 3 residential neighborhoods; Al-Sharqiya, Al-Oroba, and Al-Zawiya. Out of the 420 copies of the survey distributed over Al-Nasiriya city.Despite the challenging circumstances caused by the COVID-19 pandemic, the obtained findings of this research contribute to the existing academic literature by evaluating gender disparities that extend beyond traditional property ownership patterns in Islamic forms of land tenure rights as outlined in current ILTR, serving as an introductory case in the Middle Eastern region. These findings shed light on the quality of sex-disaggregated land rights within the Iraqi context, which, in turn, influences access to productive resources for both women and men under ILTR.
Aim: To evaluate the effect of two bonding systems and two curing systems on sealing ability of class V composite restorative materials. Materials and methods: This study was performed in vitro on 40 caries free upper first premolar teeth. The Standardized class V cavity preparation on buccal and lin- gual surfaces of each tooth was done. Then the teeth were randomly divided into two major groups each of twenty. 40 cavities were performed on these teeth and the first group7th generation bonding agent (i Bond) were applied according to the manufacturer instructions and single increment of univer- sal composite (XRV Herculite) from kerr were applied and twenty of the cavities were cured with con- ventional light cure device (astralis-5) and t
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (
... Show MoreLow-temperature stratification, high-volumetric storage capacity, and less-complicated material processing make phase-changing materials (PCMs) very suitable candidates for solar energy storage applications. However, their poor heat diffusivities and suboptimal containment designs severely limit their decent storage capabilities. In these systems, the arrangement of tubes conveying the heat transport fluid (HTF) plays a crucial role in heat communication between the PCM and HTF during phase transition. This study investigates a helical coil tube-and-shell thermal storage system integrated with a novel central return tube to enhance heat transfer effectiveness. Three-dimensional computational fluid dynamics simulations compare the proposed d
... Show MoreBackground: H.pylori colonized gastric mucosal
epithelium will virtually develop gastritis and had the
capacity to persist for decades. Pathogenesis is
dependent upon strain, virulence host genetic
susceptibility, and environmental cofactors. Leptin is
a member of the class 1 cytokine family so altered
leptin production during ifnect and inflammation that
leptin part of the cytokine cascade ,which
orchestrates the defense mechanism.
Objective: Examin the effect of H.pylori infection
on serum leptin level.
Methods: One hundred and thirty(130) Patients
attending the Endoscopic Unit at "Gastroenterology
and Hepatology Teaching Hospital/ Baghdad Medical
City"were included in this study with ages rang
In order to achieve overall balance in the economy to be achieved in different markets and at one time (market commodity, monetary and labor market and the balance of payments and public budget), did not provide yet a model from which to determine the overall balance in the economy and the difficulty of finding the inter-relationship between all these markets and put them applied in the form of allowing the identification of balance in all markets at once.
One of the best models that have dealt with this subject is a model
(LM-BP-IS), who teaches balance in the commodity market and money market and balance of payments and the importance of this issue This research tries to shed light on the reality
The researcher tackles the most outstanding conditions of experimentation, the importance of the study lies in being helpful to the workers in the field of theatre in general and directors in particular which the conditions of experimentation that should be taken.The study aims at knowing the experimental basis which the director (Sami Abdulhamid) followed in the realization of this.The researcher tackles in the First inquiry the concept of experimentation and the second tackles the conditions of experimentation.In the methodology of study the researcher analyzed the show of the "Othello in the Kitchen" and comes up to the following: 1. the dhows has cone with the nature of the previous shows experienced the methods that were not familia
... Show MoreOnline examination is an integral and vital component of online learning. Student authentication is going to be widely seen when one of these major challenges within the online assessment. This study aims to investigate potential threats to student authentication in the online examinations. Adopting cheating in E-learning in a university of Iraq brings essential security issues for e-exam . In this document, these analysts suggested a model making use of a quantitative research style to confirm the suggested aspects and create this relationship between these. The major elements that might impact universities to adopt cheating electronics were declared as Educational methods, Organizational methods, Teaching methods, Technical meth
... Show Moreتهدف الدراسة الى معرفة مدى اشتراك المكتبات المركزية للجامعات العراقية في الفهارس الالكترونية الموحدة فضلا عن التعريف بالفهرس العراقي الموحد والصعوبات التي تواجه المكتبات المركزية في الانضمام اليه والعمل على ايجاد الحلول المناسبة لكي يكون هذا العمل خطوة جادة وفعالة نحو الاشتراك في الفهرس العربي الموحد ، والتعريف بالفهرس العربي الموحد وبيان محاولات المكتبات العراقية المشاركة به قديما وحديثاً ، واعتمدت
... Show MoreThe Idea of our tagged research (The Impact of Dystopia In the
Formation of Narrative Time) Is summed up by monitoring the theme
of dystopia and Its impact on shaping the techniques of narrative time,
and In order to prove the Idea of our research, our choice focused on
the fictional production of a group of Iraqi women novelists that was
published In the time period (2003 AD-2020 AD) Through this theme,
we monitored how the temporal paradoxes operate from anticipation
and retrieval In the fragmentation of the narrative time, whichh in turn
presented a picture of the Iraqi reality In which the human Image
crumbled and its values were shattered and fragmented.
The security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show More