The aim of the present study is to identify the level of prosoical behavior of Baghdad University's students and to recognize the differences between male and female students. Moreover, it also aims to identify the level of openness to experience for these students. A random sample of (123) students has been selected; 77 males and 46 females. Two scales have been used in the study. The Prosocialness scale for adults by Caprara. Et al (2005) has been translated into the Arabic language and relies on four types of actions (Helping, Sharing, Taking care, and feeling Empathetic with others) and the other scale is the Openness to Experience Scale, which is one of the Big Five Inventory by John and Srivastava (1999). The main results showed a high level of prosaically behavior among the study sample and there are no significant differences in terms of prosaically behavior between males and females. The study also found that the level of openness to experience is high with a positive correlation between prosocial behavior and openness to experience among university students
فقدان الزوج يعد حدثًا يغير حياة النساء، مما يضطرهن إلى السباحة في عالم جديد مليء بالحزن والوحدة والشكوك. مع الوقت، تطورت طريقة تصوير الأرامل بشكل كبير تعكس التغييرات في الآراء والقيم الثقافية. تُمثل الأرامل تقليديًا بأنهن ضعيفات ومعتمدات في الأدب، مستندة إلى افتراض أنهن يفتقدن الدعم المالي بعد وفاة شركائهن. ومع ذلك، فإن هذا التصوير لا يعترف بتأثير الأرملة على الرفاهية والهوية الشخصية. يسعى هذا النص إلى
... Show MoreSeveral previous investigations and studies utilized silica fume (SF) or (micro silica) particles as supplementary cementitious material added as a substitute to cement-based mortars and their effect on the overall properties, especially on physical properties, strength properties, and mechanical properties. This study investigated the impact of the inclusion of silica fume (SF) particles on the residual compressive strengths and microstructure properties of cement-based mortars exposed to severe conditions of elevated temperatures. The prepared specimens were tested and subjected to 25, 250, 450, 600, and 900 °C. Their residual compressive strengths and microstructure were evaluated and compared with control samples (C
... Show MoreThis study explores the barriers to adopting green environmental criteria in Supplier Selection (SS) within the Iraqi food industry. It aims to enhance the understanding of sustainable supply chain management in developing nations, with a particular focus on the Iraqi context. A case study approach was utilized to identify eleven key green environmental criteria and 54 sub-criteria, alongside seven major barriers to their adoption. The Best–Worst Method (BWM) was employed to rank the criteria, and Fuzzy Stepwise Weight Assessment Ratio Analysis (SWARA) was used to prioritize the barriers. The analysis revealed that Environmental Management Systems are the most critical criterion for SS. On the other hand, legislation and policies emerged
... Show MoreThe aim of this paper to find Bayes estimator under new loss function assemble between symmetric and asymmetric loss functions, namely, proposed entropy loss function, where this function that merge between entropy loss function and the squared Log error Loss function, which is quite asymmetric in nature. then comparison a the Bayes estimators of exponential distribution under the proposed function, whoever, loss functions ingredient for the proposed function the using a standard mean square error (MSE) and Bias quantity (Mbias), where the generation of the random data using the simulation for estimate exponential distribution parameters different sample sizes (n=10,50,100) and (N=1000), taking initial
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreABSTRACT : Fifteenth isolates of C. sakazakii were obtained from previous studies of the sample (infant formula, cerebrospinal fluid and blood). All isolates C. sakazakii identification based on microscopic, biochemical test and confirmed by 16SrRNA. We studied the movement of all isolates and study adhesion to polystyrene plate, adhesion and invasion to Esophageal adenocarcinoma (SKG-GT-4) for four isolates [Cerebrospinal fluid (CSF5), Bloods (B 1), Dialak (A1c), Novolac Allernova (C1)] and its cytotoxicity. Results showed that all isolates can move after 4 hours of incubation and increased after 8 hours, the isolates moved to different distances strong, medium, and weak. The results showed that the number of C. sakazakii colony adherent t
... Show MoreThis article introduces the concept of finitely null-additive set function relative to the σ– ring and many properties of this concept have been discussed. Furthermore, to introduce and study the notion of finitely weakly null-additive set function relative to the σ– ring as a generalization of some concepts such as measure, countably additive, finitely additive, countably null-additive, countably weakly null-additive and finitely null-additive. As the first result, it has been proved that every finitely null-additive is a finitely weakly null-additive. Finally, the paper introduces a study of the concept of outer measure as a stronger form of finitely weakly null-additive.