This study aims to identify the impact of social support on breast cancer patients’ psychological rigidity using a sample in Ramallah and al-Bireh. A descriptive correlative approach was adopted to fulfill the goals of the study and a questionnaire consisted of two criteria: social support and psychological rigidity, which was adopted as a tool for data collection for the study. In order to achieve the goals of the study, the researcher selected a convenient sample that consisted of 123 female breast cancer patients in Ramallah and al-Bireh. This sample represented 50% of the original patient population. The study showed that the average estimated percentage of social support and psychological rigidity for women with breast cancer, in
... Show MoreAbstract
The current research is attempt to test the reflection of the lean management on the human resources management practices of two of the most important communication companies operating in Iraq (`Zain & Asia cell), The research aims to Determine the extent of adoption of the lean management approach in the two researched companies, as it improving human resource management practices. The research problem represented in the existence of lack of in some aspects of the application the lean management approach in service sector and neglecting the impact of its tools on the human resource management practices. For this purpose three principle research hypotheses has been formulated, first there is a correlation rel
... Show MoreDue to the large size of dealing in the transactions installment sales in durable products, especially real estate given the privacy to enjoy their property, among other products because of the large amount and the length of the repayment period leading to a risk of non-payment by the buyer because of the possibility to change the credit level to him, especially that most of this type of transaction customers are from limited income owners, So it has been proposed the use of other transactions in handling real estate instead of installment sales transactions, a rental sale transactions because of the protection provided by this transaction for a vendor that will be mentioned later.
So proposes to st
... Show MoreThe goal of the research is to highlight the role of the governance and its characteristics in increasing the tax outcome by implementing the laws, regulations and annual controls issued annually from the general authority for taxation for the financing of the general treasury of the state, Additional development and economic capacity, As the search shares a view of the governance and its characteristics and its ideas from increasing tax output. The analytical transparent approach was used by adopting the practice of practicalities of the general authority for tax For quotations in the senior cabinet section ,the revealing of the ongoing operations was relied on the revenue for each financial year, The tools adopted in the process of ana
... Show MorePDBN Rashid, International Journal of Professional Studies, 2023
Soil is a crucial component of environment. Total soil analysis may give information about possible enrichment of the soil with heavy metals. Heavy metals, potentially contaminate soils, may have been dumped on the ground. chromium, nickel and cadmium,
The poster is one of the means which can be communicate with others through it, to transfer ideas that the designer want to focus on, for its importance to accomplish the poster. It’s a visual mean contact aim to submit an idea to the audience to get a clear idea, and that would be through the shapes and subject to submit the idea. Depend on that our goal in this study is to find out, what follows:1-Finding the relationship between the shape and the idea.And the study comes up with several results, like:1-The drawings that contain themes connected with what the designer want to achieve, through the clearness of idea and to make those elements clear by putting more elements to surround the main shape.2-To assure that the strong connecti
... Show MoreIraq has the distinction of being a great potential of non-renewable natural resources,
especially crude oil and natural gas. Since the discovery of crude oil at the beginning of the
twentieth century in Iraq. Although the different of investment types, it contributed to the oil
sector in the provision of financial resources to the state treasury , since that date until the
present time.
Search has been marked by division ((The foreign investment in the oil sector in Iraq after
2003)) into three sections. The first section included a brief history of the development of
Iraq's oil potential in terms of oil reserves, and oil fields, and the quantities of production and
export. The second section reviewed the investm
Background :The cotton factories have difference steps, spinning and weaving are van important parts of the factories. Cotton industry workers are exposed to various hazards in the different departments of textile factories. The major health problems associated with cotton dust are respiratory problems. Cotton workers display an excess of lung function abnormalities when compared to a community control population.
Aim of Study: This study assessed the effect of exposure to cotton dust in spinning and weaving workers on the lung function in Iraq, by measuring Forced Vital Capacity (FVC),Forced Expiratory Volume in the first second(FEV1), FEV1 ∕ FVC Ratio, and Forced Expiratory Flow 50%(FEF50%),with varying degree of reduction in lung
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the