هدف البحث إلى بناء مقياسين تخصصين للنزاعات اللاشعورية وحرية الإرادة لمدربي بعض ألعاب القوى والتعرف على مستوى كل منهما لديهم، وإعداد برنامج إرشادي نفسي مستند لرفع مستوى الحالات اللاشعورية وحرية الإرادة للمدربين الذين يعانون من انخفاض مستوى النزاعات اللاشعورية وحرية الإرادة، والتعرف على تأثير البرنامج الإرشادي نفسي في النزاعات اللاشعورية وحرية الإرادة لدى مدربي بعض ألعاب القوى، لتفترض بذلك الباحثة بإنه توجد فروق ذات دلالة إحصائية بين نتائج الاختبارات القبلية والبعدية لقياس النزاعات اللاشعورية وحرية الإرادة لدى عينة البحث، وأعتمد المنهج التجريبي بتصميم المجموعة التجريبية الواحدة على عينة بلغت (11) مدرباً من مدربي أندية ألعاب القوى للموسوم الرياضي (2023/2024) اختيروا عمدياً بالطريقة الإجرائية بنسبة (7.7692%) من مجتمع البحث، كما أختير عشوائياً للعينة الإستطلاعية (6) مدربين يمثلون ما نسبته (4.196%) من مجتمع البحث، كذلك أختير المتبقي منهم البالغ عددهم (126) مدرباً لعينة التحليل الإحصائي الخاصة ببناء المقياسين وهم يمثلون ما نسبته (88.112%) من مجتمع البحث، وبعد إتمام بناء المقياسين بالإجراءات المنهجية والمعالجات الإحصائية، تم إعداد (12) جلسة تم تطبيقها بمعدل جلستين في الأسبوع الواحد، ليستمر تطبيق البرنامج الإرشادي النفسي الرياضي (6) أسابيع في تجربة البحث للمدة الممتدة من (7/1/2024) ولغاية (15/2/2024) وبعد الانتهاء منها تم معالجة النتائج بنظام SPSS، لتكون الإستخلاصات والتطبيقات بإن مقياسي النزاعات اللاشعوية وحرية الإرادة لمدربي ألعاب القوى يصلحان لِما أعدا لهما ويتمتعان بالأُسس والمعاملات العلمية لأدوات القياس السايكومترية في علم النفس الرياضي، ويلائمان خصوصية المدربين، وإن إعداد البرنامج الإرشادي النفسي المستند لزيادة المستوى المطلوب للنزاعات اللاشعوية وحرية الإرادة يلائم مدربي أندية ألعاب القوى، ويساعد تطبيق البرنامج الإرشادي النفسي في زيادة النزاعات اللاشعوية المطلوبة وزيادة مستوى حرية الإرادة العقلانية الملائمة لطبيعة عمل مدربي أندية ألعاب القوى، ومن الضروري الأهتمام بمراعاة الحالة النفسية لمدربي ألعاب القوى غير الطبيعية والتركيز على معالجتها إرشادياً لِما لهذهِ المشكلات النفسية من إنعكاسات سلبية تجاه اللاعبين، ومن الضروري بإن يكون إعداد البرامج الإرشادية النفسية التي تعنى بتنمية مستوى النزاعات اللاشعوية المطلوبة وحرية الإرادة العقلانية للمدربين مبنية على القياس السايكومتري لهاتين الظاهرتين وتضمين مفاهيم علم النفس الرياضي في جلساتها الإرشادية لما لها من مردودات إيجابية على الحالة النفسية والإنفعالية للمدربين. وهذا ما يحقق احد اهداف التنمية المستدامة للامم المتحدة في العراق (التعليم الجيد).
The study targets exploring the similarities and differences between Iraqi and Malaysian learners of English in refusing marriage proposals. Also, it examines the favored politeness strategies that learners use to protect their interlocutors’ face, heeding both their social distance and status. Data were gathered by a Discourse Completion Task (DCT) which contained six marriage situations. Responses were analyzed based on Beebe et al.’s (1990) refusal taxonomy and Scollon et al.’s (2012) politeness system. The findings indicated that both the Iraqi and Malaysian learners preferred the indirect refusal strategies in marriage proposals, as well as the hierarchical politeness in the form of independence strategies regardless of t
... Show MoreBack ground: AIDS is considered a dreaded disease.
According to recent estimates, 42 million people suffer
from HIV/AIDS (90% of these being in the developing
countries), with 5 million people newly infected with HIV
and 3.1 million deaths in the year 2002 globally. At
present, there is no effective vaccine to prevent the
disease. Hence, Health education (Information, Education
and Communication) activities bringing about behavioral
changes in the community, promoting healthy sexual
behavior and preventing the risky ones is the best possible
solution to the problem of AIDS.
Objectives: To find out the knowledge, beliefs and
attitudes regarding various aspects of HIV/AIDS amongst
intermediate and sec
The current study aims to determine the extent of SOMO's interest in strategic alignment operations and whether this interest is sufficient to be reflected in enhancing its organizational reputation. The field of research was in the oil marketing company SOMO. The managers in the top management within this company were targeted and the questionnaire was used as a data collection tool. The study population (109), (105) questionnaires were distributed, (94) questionnaires and (11) questionnaires were not retrieved, and the valid questionnaires had reached (91) and the analytical and descriptive approach was used for the study, the current research found to find A direct relationship and a positive effect of strategic
... Show MoreMany letters and theses written on the subject of consensus, as well as in measurement,
But we tried to address a topic of consensus
Building a blind measuring guide.
We have tried to explain the meaning of convening, then the statement of consensus in language and terminology and then the statement of measurement
Also, we have shown the types of consensus mentioned by the jurists, and this is how much was in the first topic, either
The second section included the statement of the doctrines of the blind in the matter, and then the evidence of each doctrine and discussed.
We followed it with the most correct opinion statement and concluded the research with some of the conclusions we reached through
search.
The research aims to know the traits or characteristics of woman in terms of her external
appearance, motives for her behavior, feelings, mood and ability.
It, moreover, seeks woman’s relationship with others as it is presented by the Iraqi
satirical television show “ State of Melon “.
The researcher adopted for that survey approach using the method of content analysis
to study the research sample represented by “ State of Melon “ show which was
exposed through the screen of a group of channels:
“Hona Baghdad Satellite Channel, then Asia Satellite Channel, Dijla Satellite Channel,
and UTV Satellite Channel.”For this, the researcher used Margaret Gallagher’s Model to analyze the image of
woman in
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
Psidium guajava, belonging to the Myrtaceae family, thrives in tropical and subtropical regions worldwide. This important tropical fruit finds widespread cultivation in countries like India, Indonesia, Syria, Pakistan, Bangladesh, and South America. Throughout its various parts, including fruits, leaves, and barks, guava boasts a rich reservoir of bioactive compounds that have been traditionally utilized as folkloric herbal medicines, offering numerous therapeutic applications. Within guava, an extensive array of Various compounds with antioxidative properties and phytochemical constituents are present, including essential oils, polysaccharides, minerals, vitamins, enzymes, triterpenoids, alkaloids, steroids, glycosides, tannins, fl
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreObjectives: The study intends to identify the sources of work-related stress that might face the nurses working at
psychiatric wards in Baghdad psychiatric hospitals and to find out a relationship between the levels of stress and
some demographic characteristics.
Methodology: A descriptive study was achieved from the 10th of December, 2013 through the 10th of March, 2014.
Non-probability purposive samples of 94 nurses who work in psychiatric wards of Baghdad psychiatric hospitals
were recruited to meet the study objectives. Psychological Stress Inventory (PSI) the Arabic version, which was
modified by Abu Al-Hussein (2010) (20), was used. Data were analyzed by using the statistical analysis program of
SPSS 19th versi