This study aimed to explore self and public stigma towards mental illness and associated factors among university students from 11 Arabic‐speaking countries. This cross‐sectional study included 4241 university students recruited from Oman, Saudi Arabia, the United Arab Emirates (UAE), Syria, Sudan, Bahrain, Iraq, Jordan, Lebanon, Palestine and Egypt. The participants completed three self‐administrative online questionnaires—Demographic Proforma (age, gender, family income, etc.), Peer Mental Health Stigmatization Scale and Mental Health Knowledge Questionnaire. There was a significant difference in the average mean between the 11 countries (
The research aims to: build and record a measure of cognitive participation among second-year female students at the College of Physical Education and Sports Sciences, University of Baghdad. The researchers used the descriptive approach in the survey style for the research sample. The sample was selected from female students and divided into: (10) female students for the survey sample, and (80) female students for the construction and codification sample. The data were statistically analyzed by the researchers using SPSS, the T-test for independent and correlated samples, Pearson's simple correlation coefficient, Cronbach's alpha, Chi-square, and Spearman-Brown. They were recruited for the samples. The study concluded that constr
... Show MoreIn order to evaluate the performance of introduced varieties of maize and test them under different levels of plant density, and to determine which of the introduced varieties give a high yield and at what plant density, a field experiment was carried out at Station A in the Department of Field Crops- College of Agricultural Engineering Sciences - University of Baghdad- Jadiriyah, for the fall season 2021, the RCBD design was used with four replications, in a split plot arrangement, the three plant densities (50.000, 70.000, and 90.000 Plant s ha-1) were the main plates, while the varieties represented the secondary factor, which is six varieties of maize, class 2 = 5783 DKC, Class 3 = 6315 DKC, Class 4= 6590 DKC, whic
... Show MorePoetic objects may go towards a specific purpose and dissolve and interact with them to produce
A purpose characterized by the title but belongs to the U from afar.
The yarn goes towards praise with a purely horizontal relationship that mentions virtues but crowns them towards women.
In lamentation remember the virtues but crown them towards the dead.
In wisdom remember the virtues but crown them towards time.
In the description remember the virtues but crown them towards nature. All objects are inline
Horizontal We will prove this in the axes of research has required the plan to be a blind, five
The preamble, a brief overview of the life of Dabal All Khuzaie and the works and poets of the first axis
The direction
The sustainable environmental neighborhoods is sustainable development of neighborhoods that include considerations related to transport, density, urban forms, and environmental buildings and especially those related to social and functional integration, and civil society participation, This standard, which did not attract the attention of specialists in the 1990s, has today become a center of attention for all those interested in urbanism and sustainability. The problem of the research is the existence of urban problems in residential neighborhoods that lead to lack of sustainability in the city, and the research aims to explain the role and importance of environmental sustainability
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreEvery so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph
... Show MoreAllosteric inhibition of EGFR tyrosine kinase (TK) is currently among the most attractive approaches for designing and developing anti-cancer drugs to avoid chemoresistance exhibited by clinically approved ATP-competitive inhibitors. The current work aimed to synthesize new biphenyl-containing derivatives that were predicted to act as EGFR TK allosteric site inhibitors based on molecular docking studies.
A new series of 4'-hydroxybiphenyl-4-carboxylic acid derivatives, including hydrazine-1-carbothioamide (S3-S6) and 1,2,4-triazole (S7-S10) derivatives, were synthesized and characterized using IR, 1HNMR, 13CNMR
The impact of applying the K-W-L self-scheduling technique on first-year intermediate students' learning of basic volleyball skills, Ayad Ali Hussein*, Israa Fouad Salih
The security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show More