As a consequence of a terrorist attack, people may experience posttraumatic stress disorder (PTSD) and lack of feeling secure in relationships. This longitudinal study aimed to examine the prevalence of PTSD symptoms over time, the relationship between adult attachment styles and PTSD, as well as their association with degree of exposure, and finally to consider the distribution and the trajectory of attachment styles. The sample consisted of 235 students (M=125, F=110) who were exposed to different levels of trauma intensity in response to a bombing attack. Participants were recruited and assessed approximately 1 month and 5 months after the attack using a battery of questionnaires. Findings revealed, as expected, that 79.5% of the participants met the criteria for current probable PTSD and 78.2% endorsed one of the three insecure attachment dimensions at baseline, which declined over time. Correlational analyses revealed a significant positive relationship between intensity of exposure and both PTSD symptoms and insecure attachment. The results confirm and extend previous findings on the association between direct exposure to life-threatening situation and the risk of behavioural and emotional problems among civilians, which may present as non-specific psychopathology.
insulin-like Growth Factor 1 (IGF-1) gene has been described in several studies as a candidate gene for growth. The present study attempts to identify associations between body weight traits and polymorphisms at 279 position of 5'UTR flanking region of IGF-1 gene in broiler chickens. Three hundred broiler chickens from two breeds (Cobb 500 and Hubbard F-15) were used in this study. A single nucleotide polymorphism (SNP) at 279 position of 5'UTR region of the IGF-1 gene was identified in 20.6 and 60.3% of Cobb 500 and Hubbard F-15, respectively, using the PCR-RFLP technique. Allele frequencies were 83.87 and 42.80% for the T allele and 16.13 and 57.20% for the C allele in Cobb500 and Hubbard-15 breeds, respectively. Genotype frequencies were
... Show MoreThe present research included synthesis of silver nanoparticle from(1*10-3,1*10-4 and1*10-5) M aqueous AgNO3 solution through the extract of M.parviflora reducing agent. In the process of synthesizing silver nanoparticles we detected a rapid reduction of silver ions leading to the formation of stable crystalline silver nanoparticles in the solution.
The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show MoreBackground: Since the periodontal disease Index of Ramfjord (Ramfjord index) can potentially shorten the examination time by almost half, many studies evaluated Ramfjord teeth in predicting full-mouth periodontal status of an adult population. The aim of this study was to evaluate the benefit of Ramfjord teeth in predicting the full-mouth clinical attachment level of an adult population in patients attending the college of dentistry- Baghdad University. Materials and methods: The study participants were 100 patients with age range from 30-60 years old which represent group zero. The patients were divided into three main groups according to the age of the patients. Group I and group II each of them composed of 30 patients while group III co
... Show MoreThe core interval at the K.H5\6 and K.H5\8 Wells in the West of Rutba provinces reveals a significant succession across the Late Cretaceous–Early Paleocene transition. The sampled interval encompasses a series of carbonates belonging to Digma Formation of Latest Cretaceous age, which underlies the Akashat Formtion of Danian age. Fifty-five species belonging to thirty-five genera were recognized. Based on the distribution of these species, eight biozones were distinguished, three biozones are recorded from the K.H 5\6 studied section and two biozones are documented from the K.H 5\8 studied section which refers to Late Maastrichtian age of Digma Formation. Five biozones are recorded from Akashat Formation in the K.H 5\6 studied section and
... Show MoreThe Log-Logistic distribution is one of the important statistical distributions as it can be applied in many fields and biological experiments and other experiments, and its importance comes from the importance of determining the survival function of those experiments. The research will be summarized in making a comparison between the method of maximum likelihood and the method of least squares and the method of weighted least squares to estimate the parameters and survival function of the log-logistic distribution using the comparison criteria MSE, MAPE, IMSE, and this research was applied to real data for breast cancer patients. The results showed that the method of Maximum likelihood best in the case of estimating the paramete
... Show MoreThis study aims to observe and analysis the propaganda discourse image for Daesh, and know how it marketing the fear due to symbols structure, and discover the straight meanings and hidden inspiration, with the ideology that the image presented.
The study is descriptive and qualitative, and the method is analytic survey used semiotic approach.
The most important results of the study refer to:
- Daesh functioning the image in fear manufacture in all it components: the symbol of savageness, body language, color, clothes uniform and professionally shot.
- The indicative meaning of fear promoted by Daesh based of the manufacturing «Holy», and that mean places non-touchable and non-insulted.
- Daesh used in its propagand
We study in this paper the composition operator that is induced by ?(z) = sz + t. We give a characterization of the adjoint of composiotion operators generated by self-maps of the unit ball of form ?(z) = sz + t for which |s|?1, |t|<1 and |s|+|t|?1. In fact we prove that the adjoint is a product of toeplitz operators and composition operator. Also, we have studied the compactness of C? and give some other partial results.