Preferred Language
Articles
/
jperc-1242
Fear of Intimacy and its Relationship with Post-Traumatic Stress Disorder among Yazidis Women
...Show More Authors

The current research aims to identify the fear of intimacy and post-traumatic stress disorder among Yazidi women and the correlation between them. To achieve the objectives of the research, the researcher adopted the Descutner, 1991 & (Thelen) scale, which consisted of (35) items. The researcher also adopted the post-traumatic stress disorder scale for (Davidson, 1995) translated by (Abdul Aziz Thabet), which consists of (17) items. These two scales were administered to a sample of (200) individuals. Then, the researcher analyzes the data using the Statistical Package for Social Sciences (SPSS). The results showed that the research sample of Yazidi women has a fear of intimacy. The research sample of Yazidi women is characterized by post-traumatic stress disorder. The Post-traumatic stress disorder with fear of intimate relationship is positive and statistically significant. The study came out with a set of recommendations and suggestions.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 30 2016
Journal Name
Al-kindy College Medical Journal
Deep Vein Thrombosis Predisposing Factors Analysis Using Association Rules Mining
...Show More Authors

Background: DVT is a very common problem with a very serious complications like pulmonary embolism (PE) which carries a high mortality,and many other chronic and annoying complications ( like chronic DVT, post-phlebitic syndrome, and chronic venous insufficiency) ,and it has many risk factors that affect its course, severity ,and response to treatment. Objectives: Most of those risk factors are modifiable, and a better understanding of the relationships between them can be beneficial for better assessment for liable pfatients , prevention of disease, and the effectiveness of our treatment modalities. Male to female ratio was nearly equal , so we didn’t discuss the gender among other risk factors. Type of the study:A cross- secti

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Al-dhad Book Store And Publishing
Calculus part 2
...Show More Authors

This book includes four main chapters: 1. Indefinite Integral. 2. Methods of Integration. 3. Definite Integral. 4. Multiple Integral. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.

Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Al-dhad Book Store And Publishing
Calculus part 1
...Show More Authors

This book includes three main chapters: 1. Functions & Their Derivatives. 2. Minimum, Maximum and Inflection points. 3. Partial Derivative. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.

Publication Date
Sat Apr 19 2025
Journal Name
Al–bahith Al–a'alami
International Public Relations methods in building the state's image through Cyberspace
...Show More Authors

The researcher has studied in his research (International Public Relations methods in building the state's image through Cyberspace)
, analytical study of the Facebook and twitter pages for British foreign office , the role was played by the International Public Relations in building the mental image of British , especially after the new media and internet have became influential role in political life . and became an important tools used by political institutions as ministries of foreign affairs in the twenty: one century .
The researcher identified the problem of this study with the following question:
(what is the role of the International Public Relations in building the mental image of state through Cyberspace)
To answer

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
Wastewater Bio-solids Management for Fertilizer Quality Using Co- composting Process
...Show More Authors

Co-composting process can be acquired by combining organic fraction of municipal solid waste (OFMSW) with sewage sludge (SS) and mature compost (MC) as enhancement and bulking agent to overcome the problems of municipal solid waste and wastewater treatment plants besides the finally produced fertilizer usage for agriculture and horticulture. The effects of different mixture ratios of (OFMSW), (SS) and (MC) on the performance of composting process were investigated in this study. Piles of about 10 kg were prepared by mixing OFMSW, SS and MC in three different ratios (w/w) [OFMSW: SS: MC= 3:1:1, 3:2:1, and 3:3:1]. Results showed that the pile [3:1:1] was most beneficial to composting. The final compost products contained a

... Show More
View Publication
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 19 2025
Journal Name
المستودع الرقمي للاطاريح
نجاح منظمات الاعمال على وفق التوجه الريادي لتكنولوجيا المعلومات بحث ميداني لعينة من المصارف العراقية الخاصة == The Success of Business Organizations According To The Entrepreneurial Orientation For Information Technology An Field Research At Iraqi Private Banks
...Show More Authors

المستودع الرقمي العراقي. مركز المعلومات الرقمية التابع لمكتبة العتبة العباسية المقدسة

View Publication
Publication Date
Thu Nov 19 2020
Journal Name
Indonesian Journal Of Chemistry
Determination of Eugenol in Personal-Care Products by Dispersive Liquid-Liquid Microextraction Followed by Spectrophotometry Using <i>p</i>-Amino-<i>N,N</i>-dimethylaniline as a Derivatizing Agent
...Show More Authors

Two simple methods for the determination of eugenol were developed. The first depends on the oxidative coupling of eugenol with p-amino-N,N-dimethylaniline (PADA) in the presence of K3[Fe(CN)6]. A linear regression calibration plot for eugenol was constructed at 600 nm, within a concentration range of 0.25-2.50 μg.mL–1 and a correlation coefficient (r) value of 0.9988. The limits of detection (LOD) and quantitation (LOQ) were 0.086 and 0.284 μg.mL–1, respectively. The second method is based on the dispersive liquid-liquid microextraction of the derivatized oxidative coupling product of eugenol with PADA. Under the optimized extraction procedure, the extracted colored product was determined spectrophotometrically at 618 nm. A l

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
LOCAL NEWS SOURCES IN THE IRAQI NEWSPAPERS: Local news sources in the Iraqi newspapers (An analytical study of local news sources In the newspaper Al-Zaman for the period from 1/6/2006 to 06/30/2006)
...Show More Authors

Local news is an important topic of the press because of its importance to readers. It touches their daily life in one way or another, which makes them interested in and followers of them. Hence the importance of local news, as it interests a wide segment of readers.
There are many sources of newspapers for obtaining local news, as these sources are distributed to the newspaper's own sources and external sources.

Self-sources are the newspaper's own sources, through which it is possible to obtain this news, such as the representatives of the newspaper and its correspondents and the journalists working in it. This is the example in this way.
The external sources are distributed to local and international news agencies and sa

... Show More
View Publication Preview PDF
Crossref