The current research aimed to identify the level of moral identity and social affiliation among students exposed to shock pressures, as well as to reveal the relationship between these variables. To achieve these objectives, the researcher adopted the diagnostic tool for the measure of post-traumatic stress disorder (PDS-5) scale (Foa, 2013) translated to Arabic language by (Imran, 2017). The researcher also adopted the moral identity scale built by (Al-Bayati, 2015) and the measure of social affiliation built by (Al-Jashami, 2013), which were applied to a random sample of (200) male and female students chose from al Anbar University. They were exposed to shock pressures. The results of the research showed that the sample has an average level of moral identity, and the degrees of the sample members have approached the level of the hypothetical medium. Moreover, the sample has an average level of social affiliation, and the average scores of the sample on the social affiliation scale were not statistically significant. Finally, there is a positive correlation between moral identity and social affiliation.
Cognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections. Schema and text world theories are useful tools in cognitive stylistic studies. The reader's perception o
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreIn this work, polyvinylpyrrolidone (PVP), Multi-walled carbon nanotubes (MWCNTs) nanocomposite was prepared and hybrid with Graphene (Gr) by casting method. The morphological and optical properties were investigated. Fourier Transformer-Infrared (FT-IR) indicates the presence of primary distinctive peaks belonging to vibration groups that describe the prepared samples. Scanning Electron Microscopy (SEM) images showed a uniform dispersion of graphene within the PVP-MWCNT nanocomposite. The results of the optical study show decrease in the energy gap with increasing MWCNT and graphene concentration. The absorption coefficient spectra indicate the presence of two absorption peaks at 282 and 287 nm attributed to the π-π* electronic tr
... Show MoreRotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect
... Show MoreGlobally, over forty million people are living with Human Immunodeficiency Viral (HIV) infections. Highly Active Antiretroviral Therapy (HAART) consists of two or three Antiretroviral (ARV) drugs and has been used for more than a decade to prolong the life of AIDS-diagnosed patients. The persistent use of HAART is essential for effectively suppressing HIV replication. Frequent use of multiple medications at relatively high dosages is a major reason for patient noncompliance and an obstacle to achieving efficient pharmacological treatment. Despite strict compliance with the HAART regimen, the eradication of HIV from the host remains unattainable. Anatomical and Intracellular viral reservo
The issue of the Circular Economy is not a new issue to several countries, especially the developed ones. Here in Iraq it is considered newly introduced, despite the few attempts to establish projects that concern recycling most of them were doomed to fail, due to two main reasons: the first one is the financial and administrative corruption widespread in all departments of the country, the second one is the priorities of public spending. It is well known that Iraq was subjected to two major attacks, the ISIS entry attack in 2014 to Iraq. ISIS occupied about a third of Iraqi lands which resulted in a collapse in oil prices, as Iraq depends almost entirely on oil revenues in its budget which is the second attack. This made the Iraqi governme
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreObjective: The aim of this study was to formulate and in vitro evaluate fast dissolving oral film of practically insoluble bromocriptine mesylate to enhance its solubility and to improve its oral bioavailability by avoiding first pass effect as well as to produce an immediate release action of the drug from the film for an efficient management of diabetes mellitus type II in addition to an improvement of the patient compliance to this patient- friendly dosage form. Methods: The films were prepared by the solvent casting method using hydroxypropyl methylcellulose of grades (E3, E5, E15), polyvinyl alcohol (PVA), pectin and gelatin as film-forming polymers in addition to polyethene glycol 400 (PEG400), propylene glycol (PG) and glycerin were
... Show More