Cognitive methods play the role of regulator of the human environment for its direct relationship with sensory stimuli and stimuli associated with the organization of information and ideas and their preparation for use in subsequent situations. These methods determine the characteristic or ideal way of individual personality in the differentiation and integration of attitudes or cognitive field to which he is exposed. Therefore, the research aimed at the level of psychological stress and its relation to some personal characteristics that show the personality of the artist or the students of art.
Current research aims to.
- Identifying the extent of psychological stress and its relation to the personal ch
The present paper discusses one of the most important Russian linguistic features of Arabic origin Russian lexes denoting some religious worship or some political and social positions like Qadi, Wally, Sultan, Alam, Ruler, Caliph, Amir, Fakih, Mufti, Sharif, Ayatollah, Sheikh.. etc. A lexical analysis of the two of the most efficient and most used words of Arabic origin Russian lexes that are “Caliph and Sheikh” is considered in the present study. The lexicographic analysis of these words makes it possible to identify controversial issues related to their etymology and semantic development.
The study is conducted by the use of the modern Russian and Arabic dictionary, specifically, (Intermediate lexicon Dictionary
... Show MoreThe post-Corona Covid-19 world is not the world before it, the problem of perception of personality traits with two axes: the characteristics of psychological and social compatibility, and the second aspect the mental disorder during the pandemic, and the accompanying precautions and prohibitions during the academic year 2020 AD. The aim of the research is to reveal the perception of the personal characteristics of Bisha University employees (students and faculty) during the Corona Covid-19 pandemic, and to reveal statistically significant differences in the perception of the personality traits of Bisha’s members during the Covid 19 according to the scientific qualification variables (female students -faculty members), marital st
... Show MoreThis study synthesized nanocomposite photocatalyst materials from a mixture of Cu2O nanoparticles, ZnO nanoparticles, and graphene oxide (GO) through coprecipitation and hydrothermal methods. This study aims to determine the optimum composition of Cu2O/ZnO/GO nanocomposites in degrading methylene blue. The nanocomposite was synthesized in two steps: 1 the synthesis of Cu2O and ZnO nanoparticles through the coprecipitation method and the preparation of GO through the modified Hummer method. 2 The preparation of Cu2O and ZnO nanoparticles mixtures with GO through the hydrothermal method to form Cu2O/ZnO/GO nanocomposites. The adsorption-photocatalysis process of methylene blue
... Show MoreBackground: complications of diabetes have become more common as the rate of diabetes. This complication includes liver and diabetic autonomic neuropathly.
This study is an objective literary study of the poems of Abu Dhu'ayb Al-Hudhali and Su'da Bint Al-Shamrdal. It aims to shed light on the philosophy of death in the poems, and the way this philosophy is treated by both poets. Thus, the main prominent poetic images have been addressed and the outstanding ones have been singled out. The study further investigates the intertextuality with other poetic verses and Quranic verses and reviews the deviation in their semantic, syntactic, and phonetic types. The study adopts the historical approach to examine the occasion of the poems by referring to several historical sources that indicate the seniority. It also adopts the and descriptive-analytical approach represented by the use of content anal
... Show MoreThis paper deals with a dilapidated urban part with a proposal to renew it and return it to the life cycle of the city, as in the neighborhood of Al-Mdawar, adjacent to the port of Beirut. It discusses the challenges and the need for renewal, the causes of urban deterioration, the urban development approach and the history of the regulations applied to Beirut, In the studied area. It also proposes solutions to improve its lifestyle based on urban planning tools and design to achieve people's aspirations, preserve identity and rearrange its integration with the Beirut central district area.
Many urban and rural areas fall under the impact of disasters, whether natural or industrial, and with increasing complexity in urban areas, with diversity of economic, social and political components, and technological and cognitive development, the effects of disasters and wars have increased with the time, where disasters are affecting all aspects of life, causing great waste of property and lives, also displacement of populations and disruption of economic life, these effects are multiplied if they are not dealt with in sound curricula and scientific strategies.
The research aims to identify the experiences of some countries and their strategies and effective programs in reconstruction after exposure to disasters and wars wit
... Show More This research aims to estimate stock returns, according to the Rough Set Theory approach, test its effectiveness and accuracy in predicting stock returns and their potential in the field of financial markets, and rationalize investor decisions. The research sample is totaling (10) companies traded at Iraq Stock Exchange. The results showed a remarkable Rough Set Theory application in data reduction, contributing to the rationalization of investment decisions. The most prominent conclusions are the capability of rough set theory in dealing with financial data and applying it for forecasting stock returns.The research provides those interested in investing stocks in financial
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More