The behavior of thinking is consider one of the modern concepts that appear in the last 20 years, this concept has attracted the attention of psychologists and researchers for thinking has a great role in many fields like teaching ,educational,economical,cultural and social fields.
One of thinking manner is imaginal thinking that has a great role in human civilization. imaginal thinking lead to innovation ,poems, inventions and arts. imaginal thinkingled to highscores in talented schools by escalating their thinking range and solving problems that consider one of organized and free assumption thinking.
The development of problems thinking strategies reflect the development of organized brain process ability.
That studies assumes that increasing problems solving in childhood increasing problems solving in life.
Then this research aims to:
1-Estimate adults imaginal thinking according to age scale (23, 24, 25, 26)
2- Estimateadults'imaginal thinking according to social scale.
3- Estimate adults solving problems according to age scale (23, 24, 25, 26)
4-Estimate adults solving problems according to social scale.
5- Estimate the relation between age scale and social scale.
The samples are (400) male and female employees randomly selected .the researchers established imaginal thinking scale and problems solving scale according to (information process theory) ,then extracting the psychometrical features of these scales from stability and truth .
By analyzing research data, the results are:
1(-23,24,25,26) year adults have imaginal thinking.
2-Imaginal thinking affected by social by social scale varibles in 26 years adults.
3- The problems solving ability increasing in (23,24,25,26) years adults.
4- The problem solving ability is unaffected by social type in adults.
There is positive relation between imaginal thinking and problems solving among adults .
The research achieves many proposals and recommendations.
Keywords: imaginal thinking, problems solving, adults
Banks face different types of banking risks that limit the performance of its functions and achieve its objectives, including the financial risk that is based on current research into two types including a credit and liquidity risks. And established credit risk due to the possibility of delaying the borrowers to fulfill their obligations to the bank when due or non-payments on according to the terms agreed upon, while liquidity risk arises as a result of the inability of the bank to fund the financial needs, any inability to provide cash to pay its obligations short on credit without achieving tangible loss or the inability to employ the funds properly and show the liquidity risk in the event of inadequate cash inflows to the bank for an
... Show MoreThe Love Creek Nature Center, one of the three nature centers located within the boundaries of Berrien County, is owned and operated by the county for public enjoyment and instruction of nature. The 44.5 ha study area, located seven km east of Berrien Springs, and two km southwest of Berrien Center, on Huckleberry Road, in T6S, R17W, sections 16, 17 (Lat. 41° 56' N; Long. 86° 18' W) is made up of deciduous woods and abandoned fields at various stages of succession. It is bounded on the east by the Berrien County Dog Pound and Huckleberry Road, to the north by cultivated Berrien County land and the Berrien General Hospital, to the west by the recently closed Berrien - Oronoko Township Landfill Dump; and to the south b
... Show MoreThe primary goal of root canal treatment (RCT) is to expel the presence of any necrotic or vital tissue, microbes and their byproducts from the canal space before press forward with the following steps of the RCT procedures. Although this is difficult to attain, various strives had been practiced by employing chemical and mechanical methods to eliminate as much microorganisms as possible and make the canal space valid for the obturation materials to be received. The aim of this review is to demonstrate some of what new remedies that could be used as root canal disinfectant by summarizing the recent studies regarding the efficacy of different natural products against the most persistence microbiota that could be responsible for most
... Show MoreThe current study deals with the performance of constructed wetland (CW) incorporating a microbial fuel cell (MFC) for wastewater treatment and electricity generation. The whole unit is referred to as CW-MFC. This technique involves two treatments; the first is an aerobic treatment which occurs in the upper layer of the system (cathode section) and the second is anaerobic biological treatment in the lower layer of the system (anode section). Two types of electrode material were tested; stainless steel and graphite. Three configurations for electrodes arrangement CW-MFC were used. In the first unit of CW-MFC, the anode was graphite plate (GPa) and cathode was also graphite plate (GPc), in the second CW-MFC unit, the anode was stainless steel
... Show MoreAge and growth of Varicorhinus damascinus (Val.) in Tigris river at Salahuldin province have been investigated. Monthly samples were taken during the period from September 1999 to August 2000, using small-meshed gill nets. The age data showed that there were six age groups and the dominant age groups were (III – IV) for both sexes. The results of the present study revealed that the increment in length of V. damascinus at the sites of study showed a tendency to decrease with the increase in age, after the third year of life in both sexes. The length-weight relationship of males and females were calculated and demonstrated in a straight line logarithmic formula, as follows: Log W = 1.5404 + 2.6885 log L for males r = 0.95 (P > 0.05) Log
... Show MoreSusceptibility to the pandemic coronavirus disease 2019 (COVID-19) has recently been associated with ABO blood groups in patients of different ethnicities. This study sought to understand the genetic association of this polymorphic system with risk of disease in Iraqi patients. Two outcomes of COVID-19, recovery and death, were also explored. ABO blood groups were determined in 300 hospitalized COVID-19 Iraqi patients (159 under therapy, 104 recovered, and 37 deceased) and 595 healthy blood donors. The detection kit for 2019 novel coronavirus (2019-nCoV) RNA (PCR-Fluorescence Probing) was used in the diagnosis of disease.
The meanings attributed to Female Genital Mutilation/Cutting (FGM/C) are shaped through complex negotiations within religious and socio-cultural frameworks, including those observed in Indonesia. Using a combined qualitative and quantitative (mixed methods)-ethnographic and survey approach, data from 109 students of religious tertiary institutions in East Kalimantan on their perspectives on FGM/C practices can be more comprehensively explored. The results of the study, which were analysed using the three principles of symbolic interactionism, showed that 72.5 per cent of religious college student families still practice FGM/C and 53.2 per cent stated that FGM/C practices are beneficial for women. However, they are also willing, if
... Show MoreIn the 1970s, the world knew the long-tailed nesokia Nesokia bunnii (Khajuria, 1981) (Rodentia, Muridae) from the Mesopotamian marshes of Garden of Eden in Southern Iraq. This distinct rodent was known from only five voucher specimens collected at the confluence of Tigris and Euphrates Rivers in southern Iraq while its occurrence in Southwestern Iran had
never been reported. In the 1990s, a large extent of its natural habitat was catastrophically desiccated and the animal was last seen in the 1970s. Since then, the status of this elusive rodent was shrouded in mystery. In 2007, an extraordinary photograph of a carcass of this species came to the light from Hawizeh Marsh which was interpreted as concrete evidence of the species’ pers
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More