Volunteerism is an element included in many human cultures. It represents a positive cooperative act between individuals and groups. It expresses the social value systems. As a social phenomenon, it develops in societies according to innumerous circumstances and conditions. This study uses a functional approach that assumes that volunteering performs six functions for volunteers. Namely, we assume that volunteering (1) creates a sense of protection (2) meets significant cultural values (3) improves professional status of volunteers, (4) strengthens their social relationships, (5) helps them achieve a better understanding of life, and finally, (6) enhances their outlook and self-esteem. The central aim of the study is to discuss these functions theoretically and then measure them statistically among a sample of students of the American University of Madaba within their social relations of family, friends and colleagues. The study found a set of results, the most important of which are: (1) The above functions range from high to medium, the highest being reinforcement, followed by protection, then occupation, then social dimension, then understanding, and finally values.
This research presents the concepts of compatibility and edge spaces in
Objectives: This study aimed to findout approaches which used by midwives for avoiding episiotomy and assess their knowledge regarding complications of episiotomy in three main cities of Kurdistan region. Methodology: A cross-sectional study was conducted between 1st January and 15th April 2014 in the three biggest maternity teaching hospitals. The study population included all the midwives (n=53) working in delivery rooms. Data were collected through interview with midwives. Results: The Midwives stated the followings as complications of episiotomy: tear into the rectum muscle or rectum itself (52.8%), bleedi
The rapid rise in the use of artificially generated faces has significantly increased the risk of identity theft in biometric authentication systems. Modern facial recognition technologies are now vulnerable to sophisticated attacks using printed images, replayed videos, and highly realistic 3D masks. This creates an urgent need for advanced, reliable, and mobile-compatible fake face detection systems. Research indicates that while deep learning models have demonstrated strong performance in detecting artificially generated faces, deploying these models on consumer mobile devices remains challenging due to limitations in computing power, memory, privacy, and processing speed. This paper highlights several key challenges: (1) optimiz
... Show MoreBack ground: In Iraq, after 2003 had more
accidents of the shell, bullet and stab abdominal
wounds, more over colon injuries.
Objective: The aim of this study is to evaluate
the most appropriate management of penetrating
colon injuries, comparing the primary repair with
the diversion.
Methods: Eighty patient series with shell, bullet
and stab colonic injuries during 4.5 years period
from June 2006-december 2010 at Al-Yarmouk
teaching hospital. The study compared the use of
primary repair versus diversion, analyzing
variables such as sex, age, severity of injury and
mortality rate.
Results: there were total 80 patients ,62 (77.5%)
male and 18(22.5%) female .male :female ratio
3.4:1. the most
There is a real problem when adding micro elements to the soil as a result of fixation, sedimentation, washing or toxicity, and thus economic loss. The plant needs micro elements in very small quantities that do not burn the leaves or cause poisoning to plants, including iron, zinc and boron, as they are essential elements for growth and completing the plant's life cycle, and increase the plant's resistance to diseases and insects, activate enzymes, and form the chlorophyll molecule, in addition to their role in oxidation and reduction processes and vital processes. The use of fertilizers with their modern technology has made the process of activating seeds or foliar nutrition a matter of interest to researchers as a complementary process t
... Show MoreFor the duration of the last few many years many improvement in computer technology, software program programming and application production had been followed with the aid of diverse engineering disciplines. Those trends are on the whole focusing on synthetic intelligence strategies. Therefore, a number of definitions are supplied, which recognition at the concept of artificial intelligence from exclusive viewpoints. This paper shows current applications of artificial intelligence (AI) that facilitate cost management in civil engineering tasks. An evaluation of the artificial intelligence in its precise partial branches is supplied. These branches or strategies contributed to the creation of a sizable group of fashions s
... Show MoreThe current research aims to diagnose the extent of interest in knowledge sharing and its role in achieving organizational excellence at the level of the Iraqi environment Primary data through descriptive statistics (arithmetic mean, standard deviation, coefficient of variation, percentages, frequencies) and hypothesis testing using appropriate statistical methods for inferential statistical analysis (Pearson correlation coefficient, simple linear regression, multiple regression, path analysis) and checking the quality of the data from During (normal distribution, confirmatory factor analysis, structural modeling method, and exploratory factor analysis), after collecting data from (358) observations from the company’s leaders, as
... Show MoreThe process of risk assessment in the build-operate transfer (BOT) project is very important to identify and analyze the risks in order to make the appropriate decision to respond to them. In this paper, AHP Technique was used to make the appropriate decision regarding response to the most prominent risks that were generated in BOT projects, which includes a comparison between the criteria for each risk as well as the available alternatives and by mathematical methods using matrices to reach an appropriate decision to respond to each risk.Ten common risks in BOT contracts are adopted for analysis in this paper, which is grouped into six main risk headings.The procedures followed in this paper are the questionnaire method
... Show MoreAromaticity reversals between the electronic ground (S0) and low-lying singlet (S1, S2) and triplet (T1, T2, T3) states of naphthalene and anthracene are investigated by calculating the respective off-nucleus isotropic magnetic shielding distributions using complete-active-space self-consistent field (CASSCF) wavefunctions involving gauge-including atomic orbitals (GIAOs). The shielding distributions around the aromatic S0, antiaromatic S1 (1Lb), and aromatic S2 (1La) states in naphthalene are found to resemble the outcomes of fusing together the respective S0, S1, and S2 shielding distributions of two benzene rings. In anthracene, 1La is lower in energy than 1Lb, and as a result, the S1 state becomes aromatic, and the S2 state becomes anti
... Show More