Abstract [email protected] Background: Acute Traumatic Stress Disorder (ATSD) might be complicated by Post Traumatic Stress Disorder (PTSD). Psychological First Aid (PFA) said to be helpful to reduce the possibility of reduction of ASD and PTSD symptoms. PFA is simple procedure to deliver help & support to victims, may be by some one close to him, quietly and professionally. Iraq has and is still experiencing, continuous traumatic stresses. ATSD is especially seen in war such as during the Gulf War, Embargo and nowadays under the current American occupation. With the extreme shortage of recourses and the given late priority to psychological problems and intervention have disastrous consequences on the psycho-social wellbeing of people. Aims: To construct: 1. ATSD Scale (ATSDS) and 2. PFA Program (PFAP) to be used by careers. Using the null hypothesis, it was expected that there will not be significant reduction in ATSD symptoms after the implementation of PFAP. Methods: ATSD Scale was constructed using a 256 population from of both sexes with an age range 15-54 years. Diagnosis based upon DSM-IV criteria for ATSD classification. 10 female patients (23-54) year were treated individually by debriefing as part of the PFAP. Suitable and randomly referred patients were treated over; 12 biweekly sessions, for 45 minutes each session for the period from June 2003- September 03. Outcome: Both ATSD and ATSDP proved to be valid and reliable. Using Will- Coxon’s Rank Signal Test; PFAP for ATSD was effective in reducing the ATSD symptoms significantly. This result was compatible with the literature. Further studies are recommended to use; larger samples and a follow up period, as well as application of PFAP in group setting might prove to be more cost effective in massive traumatic crises and casualties like war. Keys: Acute, Aid, Debriefing, Disorder, First, Iraq, Post, Psychological, Stress, Traumatic, Treatment, War.
The urban Gentrification is an inclusive global phenomenon to restructure the cities on the overall levels, the research to propose a specific study about the concept of urban Gentrification in the cities and showcasing its, specifications, and results, and how to deal with the variables that occur on cities through improvements as part of urban renewal projects, then the general axis of the research is shrinked, choosing the urban centers as the most important areas that deal with the urban Gentrification process due to its direct connection with indivisuals and social changes, and to process the specific axis of the research theses and studies will be showcased that discuss the topic in different research directions, and emerged
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
Any software application can be divided into four distinct interconnected domains namely, problem domain, usage domain, development domain and system domain. A methodology for assistive technology software development is presented here that seeks to provide a framework for requirements elicitation studies together with their subsequent mapping implementing use-case driven object-oriented analysis for component based software architectures. Early feedback on user interface components effectiveness is adopted through process usability evaluation. A model is suggested that consists of the three environments; problem, conceptual, and representational environments or worlds. This model aims to emphasize on the relationship between the objects
... Show MoreFractal geometry is receiving increase attention as a quantitative and qualitative model for natural phenomena description, which can establish an active classification technique when applied on satellite images. In this paper, a satellite image is used which was taken by Quick Bird that contains different visible classes. After pre-processing, this image passes through two stages: segmentation and classification. The segmentation carried out by hybrid two methods used to produce effective results; the two methods are Quadtree method that operated inside Horizontal-Vertical method. The hybrid method is segmented the image into two rectangular blocks, either horizontally or vertically depending on spectral uniformity crit
... Show Moretock markets changed up and down during time. Some companies’ affect others due to dependency on each other . In this work, the network model of the stock market is discribed as a complete weighted graph. This paper aims to investigate the Iraqi stock markets using graph theory tools. The vertices of this graph correspond to the Iraqi markets companies, and the weights of the edges are set ulrametric distance of minimum spanning tree.
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show Moreتشكل التغيرات الحاصلة في اسعار النفط تحديا" حقيقيا" لاستمرار عملية النمو في العراق, وامام الحكومة فرصة كبيرة لإيجاد حلول ناجعة لمشكلة تزايد عجز الموازنة العامة من خلال اللجوء الى اصدار ادوات الدين العام الداخلي والخارجي, وهذا يتطلب بناء استراتيجية لإقامة وتطوير سوق السندات الحكومية في العراق, لتتمكن الحكومة من خلاله توفير مصادر تمويل اضافية, تسهم في تمويل الانفاق الاستثماري الحكومي ودعم النمو ودعم
... Show More