Stress is an inevitable part of life. Stress occurs when stressful events of self, environmental, or social origin affect the individual's resilience and threaten to collapse his psychological and physical systems. The stress represents difficulties and obstacles that may exceed the individual's ability to bear them and deal with them, which causes him stress and causes negative effects on his psychological and physical health. Therefore, the current research aimed to identify the negative effects of psychological stress on the psychological and physical health of the individual through the literature that dealt with this topic. It was among the results of the research that one of the negative effects of stresses on mental health is the deterioration of the concept of the self in individuals and their feeling of frustration and poor compatibility and the emergence of symptoms of various mental disorders they have. While the negative effects of stress on the physical health of individuals are weakening the work of the immune system and infection with various infections, in addition to high blood pressure, cardiovascular disease, diabetes, digestive diseases and skin diseases. The researcher recommended to educate the community about stress and its impact on the health of individuals, and to prepare awareness programs by professionals on this topic.
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreExperimental and numerical investigations of the centrifugal pump performance at non-cavitating and cavitating flow conditions were carried out in the present study. Experiments were performed by applying a vacuum to a closed-loop system to investigate the effects of the net positive suction head available (NPSHa), flow rate, water temperature and pump speed on the centrifugal pump performance. Accordingly, many of the important parameters concerning cavitation phenomenon were calculated. Also, the noise which is accompanied by cavitation was measured. Numerical analysis was implemented for two phase flow (the water and its vapor) using a 2-D simulation by ANSYS FLUENT software to investigate the internal flow of centrifugal pump under c
... Show More<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreThis research aims to explore the impact of strategic intelligence by his dimensions (Foresight , system thinking, vision, motivation and partnership) on decision making styles which represented by ( rational, intuitive, dependent, Spontaneous and Avoidant style) for a sample of the administrative leaders in the center of Reconstruction &Housing Ministry and Some its formations which are companies of (Sa'ad, Al Mansour, al Farouq, Assyria, al-Mu'tasim, al- Rasheed, and Public Authority for Housing). So to achieve the research objectives and to test hypotheses, it has been relying
... Show MoreManagement Representations Letter plays a significant role as an evidence to get conclusions the Auditor is looking for. These conclusions could show the professional opinion of auditor over the fairness and integrity of financial statements for many issues and numbers that management claims, Hereby, the research aims at highlighting the importance of Management Representations Letter and the way of using as an evidence with expressing its meaning and means of application in addition to identify the Responsibility of Auditor on that Letter, This research discusses also the effect of Management Representations Letter on the credibility of financial statement and enhancing the credibility of the submitted reports, From other side, in the t
... Show MoreBackground: One of the most prevalent procedures in oral surgery is the removal of impacted mandibular third molars, typically accompanied by trismus, edema, and pain. Several methods and biomaterials were implemented to mitigate or avoid these surgical problems. Objectives: To evaluate the efficiency of chlorhexidine gel (WISDOM®) in minimizing postoperative sequelae associated with the impacted mandibular third molar that will be surgically extracted and its role in promoting early soft tissue closure of the surgical site. Methods: The study design was a double-masked and randomized, controlled clinical study that included healthy patients needing the removal of a mandibular third molar through surgery. The participants were rand
... Show MoreAn experimental investigation of the variation of argon discharge current with a glow and afterglow time intervals of a square discharge voltage was carried out at low pressure (6-11 mbar). The discharge was created between two circular metal electrodes of diameter (7.5 cm), separated horizontally by a distance (10 cm) at the two ends of a Pyrex cylindrical tube. A composite of two Gaussian functions has been suggested to fit and explain the variation graphs clearly. It is shown that the necessary times of glow and afterglow needed to attain a maximum discharge current are (70 us) and (60 us), respectively. The discharge current is observed to drop to the lowest value when the two times are serially longer than (85 us) and (72 u
... Show More
|
Abstract This research deals with the definition of the concept of nodal purposes, And what is related to it, from its aim and importance, And for the purposes of the importance of Streptococcus In trying to understand the nodal truths For different minds, Especially with those who object to the introduction of belief in purposes studies, This research has two requirements: The first requirement: the concept and the aim of contractual purposes,It consists of two branches, The first is in the concept of nodal purposes, And it dealt with the definitions in terms of language and terminology And what we see is proportional to what aim |