Preferred Language
Articles
/
jperc-1168
The Effect of Relaxation on Symptoms of Post-Traumatic Stress Disorder (PTSD) among displaced Yazidi Women
...Show More Authors

The study aims to identify the symptoms of PTSD among displaced Yazidi women according to age, marital status, educational level, and type of status (displaced or survivor). The study also seeks to identify the effect of the relaxation program on reducing PTSD among displaced Yazidi women. The research sample included (60) Yazidis for the statistical analysis sample and (5) for the experimental sample in the Dohuk governorate. For achieving the research objectives, a scale was used from the PTSD Checklist for DSM-5 (PCL-5), as well as a relaxation program was prepared. The researchers reached the following results that there is an average level of PTSD symptoms among displaced Yazidi women, there are no statistically significant differences in PTSD symptoms according to the (age, education, and marital status) among the study sample. Additionally, there are statistically significant differences in PTSD symptoms according to the type of status: (survivor and displaced) in favor of the survivors. There are statistically significant differences in the symptoms of PTSD among patients with PTSD before and after the relaxation program. In light of the research results, the researcher presented a number of         recommendations and suggestions.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 20 2025
Journal Name
3rd International Conference On Construction Engineering At: Damascus, Syria
Investigation on the Moment-Curvature Relationship in GFRP Reinforced Concrete Beams
...Show More Authors

Publication Date
Mon Jun 30 2008
Journal Name
Iraqi Journal Of Science
On the Greedy Ridge Function Neural Networks for Approximation Multidimensional Functions
...Show More Authors

The aim of this paper is to approximate multidimensional functions f∈C(R^s) by developing a new type of Feedforward neural networks (FFNS) which we called it Greedy ridge function neural networks (GRGFNNS). Also, we introduce a modification to the greedy algorithm which is used to train the greedy ridge function neural networks. An error bound are introduced in Sobolov space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result in [1]).

Preview PDF
Publication Date
Tue Mar 01 2016
Journal Name
Journal Of Engineering
Energy Dissipation on the Ogee Spillways by Using Direction Diverting Blocks
...Show More Authors

The purpose of this study is to evaluate the hydraulic performance and efficiency of using direction diverting blocks, DDBs, fixed on the surface on an Ogee spillway in reducing the acceleration and dissipating the energy of the incoming supercritical flow. Fifteen types of DDB models were made from wood with a triangulate shape and different sizes were used. Investigation tests on pressure distribution at the DDBs boundaries were curried out to insure there is no negative pressures is developed that cause cavitation. In these tests, thirty six test runs were accomplished by using six types of blocks with the same size but differ in apex angle. Results of these test showed no negative pressures developed at the boundarie

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Palarch's Journal Of Archaeology Of Egypt/egyptology
EMIRATI-ISRAELI NORMALIZATION AND ITS IMPACT ON THE PALESTINIAN-ISRAELI CONFLICT
...Show More Authors

The Arab-Israeli conflict passed through several stages before reaching the final stage of normalization, namely conflict, conflict and public normalization. Thus, the UAE became the third country to establish official relations with Israel after Egypt in 1979 and Jordan in 1994. With the announcement of the normalization agreement, opinions varied between supporters and opponents of the idea of normalization with Israel, and some countries expressed their acceptance of establishing official relations between the Emirates and Israel, while others warned of the consequences of normalization, which they described as treachery. Although the UAE confirmed that the normalization agreement between the two sides was credited with stopping Israel's

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Stances on the damage to manuscripts and ways to address them
...Show More Authors

Humans knew writing and to blog motivated by the need for registration and documentation, and tried from the very beginning of research to find the most suitable material for this purpose, he used many different materials in form, nature, and composition, so it is written on the mud by the ancient Sumerian people in different forms and when the text is long Numbered as the pages of the book at the present time, this research will deal with the damage to manuscripts and then find ways to address them.

View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Theoretical And Applied Information Technology
A Survey on the Vein Biometric Recognition Systems: Trends and Challenges
...Show More Authors

Vascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed

... Show More
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Indicative supervision on the monetary business organizations (Banks) Case study: Iraq
...Show More Authors

Indicative supervision represents the comparison between direct intervention (acquisition, nationalism) and participation through rules.

The last financial crisis reflected our needs for different approaches of supervision consist with our goals, but the crisis reveals also number of sounds requested and pressured toward direct control (Intervention via forces) through government acquisition and nationalization.

This study attempts to deal with crisis lessons, in the field of choice between indicative and direct supervision which government authorities used to reduce the bad effect on the monetary firms.

Iraqi banks suffered from high levels of direct co

... Show More
View Publication
Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Political Sciences Journal
The US-Iranian dispute and its repercussions on Iraq After 2003
...Show More Authors

Receipt date: 8/8/2020 acceptance date: 9/11/2020 Publication date: 31/12/2021

Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License.

           The American-Iranian relations have been characterized by tensions since the arrival of the guardian jurist regime in Iran to leadership in 1979, as it was considered a turning point not only in the cont

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (23)
Crossref (13)
Scopus Crossref
Publication Date
Tue Jan 16 2024
Journal Name
International Journal Of Analysis And Applications
Fear and Hunting Cooperation's Impact on the Eco-Epidemiological Model's Dynamics
...Show More Authors

Due to the fact that living organisms do not exist individually, but rather exist in clusters interacting with each other, which helps to spread epidemics among them. Therefore, the study of the prey-predator system in the presence of an infectious disease is an important topic because the disease affects the system's dynamics and its existence. The presence of the hunting cooperation characteristic and the induced fear in the prey community impairs the growth rate of the prey and therefore affects the presence of the predator as well. Therefore, this research is interested in studying an eco-epidemiological system that includes the above factors. Therefore, an eco-epidemiological prey-predator model incorporating predation fear and

... Show More
View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref