Preferred Language
Articles
/
jperc-164
Techniques of family guidance in the face of marital and marital problems
...Show More Authors

Summary First: The importance of the study and the need for it: The society is composed of an integrated unit of groups and institutions that seek to achieve a specific goal within a system of salary, and the family remains the most influential institutions on the individual and the unity of society, with the roles and responsibilities of the individual and society, and through the continuation and strength of other social organizations derive their ability On the other hand, any break-up in the institution of the family is reflected negatively on the cohesion of society and its interdependence, and the causes of this disintegration vary from society to another, but family problems remain the main factor in obtaining it. Second: Study Objectives : The present study aims to identify; 1-Marital and family problems 2-Causes of marital and family problem. . Family counseling theories 3- . Family extension techniques used to solve family problems 4- Third: Limits of the study ... Fourth: the definition of terminology ... The terms mentioned in the title of the research will be defined Chapter II ... This chapter includes explanation and clarification ... Categories marital and family problems. Causes of marital and family problems. Family counseling theories. Family extension techniques used to solve family problems Chapter III ... Conclusions and recommendations of the research

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Securing Physical Layer for FHSS Communication System Using Code andPhase Hopping Techniques in CDMA, System Design and Implementation
...Show More Authors

The Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of these, then duplicate this sequence in order to hack the signal on both transmitter and receiver messages using the order of the se

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 30 2025
Journal Name
Journal Of Baghdad College Of Dentistry
A Comparative Study between Flapped and Flapless Surgical Techniques in Dental Implant Stability According to Resonance Frequency Analysis
...Show More Authors

Background: Recent implant surgical approach aims to cause less trauma, invasiveness and pain as much as possible and to reduce patient and surgeon discomfort, time of surgery and time needed for functional implant loading. Flapless surgical techniques considered recently as one of the most popular techniques that may achieve these aims especially enhancing osseointegration and subsequently implant stability within less time than the traditional flapped surgical technique. So this study aimed to make a comparison between flapped and flapless surgical techniques in resulted implant stability according to resonance frequency analysis RFA and in duration of surgical operation. Materials and methods: A total of 26 patients with 41 implants (o

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Aro-the Scientific Journal Of Koya University
Enhancing Upper Limb Prosthetic Control in Amputees Using Non-invasive EEG and EMG Signals with Machine Learning Techniques
...Show More Authors

Amputation of the upper limb significantly hinders the ability of patients to perform activities of daily living. To address this challenge, this paper introduces a novel approach that combines non-invasive methods, specifically Electroencephalography (EEG) and Electromyography (EMG) signals, with advanced machine learning techniques to recognize upper limb movements. The objective is to improve the control and functionality of prosthetic upper limbs through effective pattern recognition. The proposed methodology involves the fusion of EMG and EEG signals, which are processed using time-frequency domain feature extraction techniques. This enables the classification of seven distinct hand and wrist movements. The experiments conducte

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Apr 30 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of tissue displacement in posterior palatal seal area with different impression techniques with varying palatal forms
...Show More Authors

Background: This study was designed to measure the displacement pattern of posterior palatal seal (pps) area in different forms of the palate and with different impression techniques. Materials and method: This study was used to measure the displacement pattern of (pps)in different palatal shapes by using different impression materials Korrecta wax No.4,Green compound and design of House for pps for each palatal forms by using a 3D Scanner of CAD/CAM and measuring the distance between 2 points in pps area by using Caural Threw. Result: The results show highly significant differences between these techniques and the control group (impression with light body) Conclusion: The physiological impression technique of pps with Korecta wax no.4

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 01 2022
Journal Name
Precision Radiation Oncology
Assessment of dose‐volume histogram statistics using three‐dimensional conformal techniques in breast cancer adjuvant radiotherapy treatment
...Show More Authors
Abstract<sec><title>Objective

Breast cancer (BC) is first of the top 10 malignancies in Iraq. Dose‐volume histograms (DVHs) are most commonly used as a plan evaluation tool. This study aimed to assess DVH statistics using three‐dimensional conformal radiotherapies in BC in an adjuvant setting.

Methods

A retrospective study of 70 histologically confirmed women diagnosed with BC was reviewed. The study was conducted between November 2020 and May 2021, planning for treatment with adjuvant three‐dimensional conformal radiotherapies. The treatment plan used for each woman was based on an analysis of the volumetric dose, inclu

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sat Dec 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Charge Transfer Between d-p States in Ti02 By Employing Compton Scattering Techniques
...Show More Authors

The com pton profiles for Ti02 have been measured using a SCi

Am-241 compton spectrometer .A pellet of the oxide was prepared from a polycrystalline powder    having a thickness of 1.54 mm ,about J 00000  counts   have   been  accumulated   at   the  compton   peak

.Theoreti cal compton profiles have been calculated for different ionic anangements using free atom compton profile for the core electrons.The   theoretical  and  experimental  results  ahrce  well  for (Ti/4(0 .2    arrangement which support complete transfer of valence electrons from metal to oxygen ions, i.e., full ionic &nbs

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 02 2023
Journal Name
Applied Sciences
Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review
...Show More Authors

The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach

... Show More
View Publication Preview PDF
Scopus (87)
Crossref (81)
Scopus Clarivate Crossref
Publication Date
Wed Apr 30 2025
Journal Name
Sciences Journal Of Physical Education
المشكلات النفسية المترتبة على جائحة كوفيد 19 لدى طالبات وتدريسيات جامعة بغداد الممارسات وغير الممارسات للرياضة
...Show More Authors

View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Accurate Four-Step Hybrid Block Method for Solving Higher-Order Initial Value Problems
...Show More Authors

This paper focuses on developing a self-starting numerical approach that can be used for direct integration of higher-order initial value problems of Ordinary Differential Equations. The method is derived from power series approximation with the resulting equations discretized at the selected grid and off-grid points. The method is applied in a block-by-block approach as a numerical integrator of higher-order initial value problems. The basic properties of the block method are investigated to authenticate its performance and then implemented with some tested experiments to validate the accuracy and convergence of the method.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Gazi University Journal Of Science
Reliable Iterative Methods for Solving Convective Straight and Radial Fins with Temperature-Dependent Thermal Conductivity Problems
...Show More Authors

In our article, three iterative methods are performed to solve the nonlinear differential equations that represent the straight and radial fins affected by thermal conductivity. The iterative methods are the Daftardar-Jafari method namely (DJM), Temimi-Ansari method namely (TAM) and Banach contraction method namely (BCM) to get the approximate solutions. For comparison purposes, the numerical solutions were further achieved by using the fourth Runge-Kutta (RK4) method, Euler method and previous analytical methods that available in the literature. Moreover, the convergence of the proposed methods was discussed and proved. In addition, the maximum error remainder values are also evaluated which indicates that the propo

... Show More
View Publication
Crossref (5)
Crossref