Preferred Language
Articles
/
jperc-145
EMDR impact on a sample of Displaced persons
...Show More Authors

Abstract [email protected] Background: Acute Traumatic Stress Disorder (ATSD) might be complicated by Post Traumatic Stress Disorder (PTSD). Psychological First Aid (PFA) said to be helpful to reduce the possibility of reduction of ASD and PTSD symptoms. PFA is simple procedure to deliver help & support to victims, may be by some one close to him, quietly and professionally. Iraq has and is still experiencing, continuous traumatic stresses. ATSD is especially seen in war such as during the Gulf War, Embargo and nowadays under the current American occupation. With the extreme shortage of recourses and the given late priority to psychological problems and intervention have disastrous consequences on the psycho-social wellbeing of people. Aims: To construct: 1. ATSD Scale (ATSDS) and 2. PFA Program (PFAP) to be used by careers. Using the null hypothesis, it was expected that there will not be significant reduction in ATSD symptoms after the implementation of PFAP. Methods: ATSD Scale was constructed using a 256 population from of both sexes with an age range 15-54 years. Diagnosis based upon DSM-IV criteria for ATSD classification. 10 female patients (23-54) year were treated individually by debriefing as part of the PFAP. Suitable and randomly referred patients were treated over; 12 biweekly sessions, for 45 minutes each session for the period from June 2003- September 03. Outcome: Both ATSD and ATSDP proved to be valid and reliable. Using Will- Coxon’s Rank Signal Test; PFAP for ATSD was effective in reducing the ATSD symptoms significantly. This result was compatible with the literature. Further studies are recommended to use; larger samples and a follow up period, as well as application of PFAP in group setting might prove to be more cost effective in massive traumatic crises and casualties like war. Keys: Acute, Aid, Debriefing, Disorder, First, Iraq, Post, Psychological, Stress, Traumatic, Treatment, War.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 24 2018
Journal Name
2018 Aiaa/ceas Aeroacoustics Conference
Mimicking the serration effects on aerofoil by leading edge blowing
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Pharmaceutical Negative Results
Environmental effects on intestinal parasitic disease transmission in Mosul governorate
...Show More Authors

This study, which was conducted in the city of Mosul, through collected 1200 samples from the stool of patients with diarrhea attending hospitals and private clinics for the period from the beginning of January 2019 to the end of December 2019, those whose ages ranged from less than a year-60 year, and for both sexes and by reality 700 samples stool for males and 500 samples stool for females. Samples were collected in clean, sterile, and sealed 40ml plastic bottles. Patient information is noted, name of the parasite, history, sex, age, address. The result showed that climate and temperature have a significant effect on increase the incidence of intestinal parasites through the direct effect on the increase in infection rate. This effect wa

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Tue Oct 30 2018
Journal Name
Iraqi Journal Of Physics
N3, N749 dyes effect on the TiO2 for optoelectronic applications
...Show More Authors

The present work aimed to study effect of (N749 & N3) dyes on TiO2 optical and electrical properties for optoelectronic application. The TiO2 paste prepared by using a doctor blade method. The samples were UV-VIS specterophometricall analyzes of TiO2 before and after immersed in dyes (N749 & N3). The results showed absorption spectra shift toward the visible region due to the adsorption of dye molecules on the surface of oxide nanoparticles. It is seen that the Eg determined to give a value of 3.3eV for TiO2 before immersing in dyes, and immersing in dyes (N749 & N3) are (1.4 &1.6 eV) respectively. The structural properties (XRD), (FTIR) and (SEM) for the sample prepared were investigated and (J-V) characteristics was stu

... Show More
View Publication
Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
The Factors Affecting on Managing Sensitive Data in Cloud Computing
...Show More Authors

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
On Solving Hyperbolic Trajectory Using New Predictor-Corrector Quadrature Algorithms
...Show More Authors

In this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.

View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Plant Archives
The seasonal effect on the water bodies in Iraqi marshlands
...Show More Authors

Scopus (5)
Scopus
Publication Date
Sun Jan 10 2016
Journal Name
British Journal Of Applied Science & Technology
Robust Watermarking for Video Using Modulation Technique on RGB Domain
...Show More Authors

In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom

... Show More
View Publication Preview PDF
Crossref