Background; paraphilias were studied in the sex
clinic, at Al-Rashad teaching mental hospital, in the
years 2009-2010, a subject never touched before in the
field of psychiatry in Iraq.
Aims of the study :
1-to identify the prevalence of types and number of
paraphilias in those patients.
2-to study the relationship of paraphilias with
sociodemographic factors of the patients.
Patients and methods; using the diagnostic criteria of
DSM IV TR, 52 patients from the outpatient sex clinic
at Al-Rashad mental hospital, collected and studied (41
males and 11 females).
Results; the ratio of men to women was 3.7 : 1, the
majority of our sample was in the age range of 21-30
years (36.35%), with a limited(primary education)(
about 48%) or no education(36.53%), not married as a
status was found in 48.07%, and low socio-economic
level was in 57.69% of our sample. Exhibitionism was
found in 19.23% of our sample, followed by zoophilia
in males 17.07%, most of the disorders were found
exclusively in males, apart from masochism and some
of the paraphilias not otherwise specified (NOS).
Conclusion; paraphilia as a group of disorders, exist in
our society, but lurks in the shadows of our strict
cultural and religious societal background, they are
suppressed and stigmatized, for the majority of our
patients were collected first in a private clinic, then
directed and encouraged to the sex clinic by the
researchers.
The modern business environment has witnesses tremendous developments as a result of the globalization of markets and economic openness and technological as well as the acquisition of the issue of corporate governance of great importance regarding it as one of the global innovations trends of control provisions on the management of companies as result of these developments ,increasing on competition between economic unit ,thus a decrease in market share because they do not take into account the response to the requirements of customers ,which kept her to search a modern management accounting methods to help them keep up with the changes and the availability of information for the various adminis
... Show MoreThe current study aims to overcome the conflicts facing the company in its way of staying and continuing to maintain its performance excellent in light of the intense competition, which made it seek to find strong ways and links with its customers through electronic communication using electronic platforms, and this put confidence and safety in The place of suspicion and fear of not fulfilling credibility or violating the privacy, so this research comes to answer about the question: “Can the company achieve an excellent performance by relying on the customer's electronic confidence?”.
The study followed the descriptive and analytical approaches by providing a virtual model and testing the zero hypotheses, which stipulat
... Show MoreThe researcher tackles the most outstanding conditions of experimentation, the importance of the study lies in being helpful to the workers in the field of theatre in general and directors in particular which the conditions of experimentation that should be taken.The study aims at knowing the experimental basis which the director (Sami Abdulhamid) followed in the realization of this.The researcher tackles in the First inquiry the concept of experimentation and the second tackles the conditions of experimentation.In the methodology of study the researcher analyzed the show of the "Othello in the Kitchen" and comes up to the following: 1. the dhows has cone with the nature of the previous shows experienced the methods that were not familia
... Show MoreThe goal of current research is marked "student services for the university student at the Faculty of Education for Girls at Baghdad University in light of the overall quality indicators)" to identify the relative importance of the availability of student services offered by the College of Education at the University of Baghdad, from the viewpoint of the students. The research was Aaguetdy followers researcher Find descriptive approach to suitability research topic and in order to achieve the purposes of research, the researcher designed questionnaire examined consisted of (18) items and has been questionnaire on arbitrators and experts to verify the validity and reliability that's been applied to the questionnaire on a group of students
... Show MoreObjective(s): to assess the effectiveness of educational program on improving diabetic foot self-efficacy concerning managing their feet. Methodology: A descriptive analytic (quasi – experimental) design study was carried out at Diabetic and Endocrinology Center in Baghdad- Rusafa Sector from 2nd of May 2017, to27th June 2018. Non-probability sample of (80) male and female diabetic patients were selected. The study instruments consisted of two major parts: first
Objective: To assess the nutritional status of hemodialysis patients.
Methodology: A descriptive quantitative cross sectional study was effectuated in hemodialysis centers from
February 2011 to September 2011. A purposive "non-probability" sample of (70) male and female hemodialysis
patients in al-Najaf al-Ashraf Governorate from those who have spent more than six months on maintenance
hemodialysis schedule. Data collected through using of a well-designed questionnaire consist of five parts, part
one consists of sociodemographic contain (9) items, and part two consists of medical data contain (8) items, and
part three consists of health and nutrition behavior contain (12) items plus (8) items of anthropometric
measur
The main aim of this paper is to study how the different estimators of the two unknown parameters (shape and scale parameter) of a generalized exponential distribution behave for different sample sizes and for different parameter values. In particular,
. Maximum Likelihood, Percentile and Ordinary Least Square estimators had been implemented for different sample sizes (small, medium, and large) and assumed several contrasts initial values for the two parameters. Two indicators of performance Mean Square Error and Mean Percentile Error were used and the comparisons were carried out between different methods of estimation by using monte carlo simulation technique .. It was obse
... Show MoreThe aim of this study is to identify the effect of enabling the effectiveness of the work of the audit committees in private commercial banks and to identify the extent of awareness of the importance of empowerment in the work of these committees, especially as it is known that these committees, especially the inspection committees that go to private banks and from various sources including committees of the Central Bank of Iraq Committees of the Securities Commission and finally committees of the external audit offices, through an analysis of the determinants of empowerment in the performance of the most important work of the audit committees, namely: supervising the process of preparing reports, supervising the system of intern
... Show MoreThe subject of the strategic vision is of great importance to all companies because they live in an environment of rapid change in various areas of life. Supports the performance of its operations in a better way, towards appropriate strategic growth and achieving success. The research aims to determine the level of interest of the researched company in the research variables (strategic vision and growth strategy), and the importance of the research came in being an attempt to provide the theoretical and scientific foundations for the research variables (strategic vision and growth strategy). As for the research method, it was relied on the descriptive analytical method, relying on the questionnaire as a means of obtaining data from the
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the