Preferred Language
Articles
/
jperc-250
Prevalence of Posttraumatic Stress Symptomatology and Distribution of Attachment Patterns 1 and 5 Months after a Terrorist Attack
...Show More Authors

As a consequence of a terrorist attack, people may experience posttraumatic stress disorder (PTSD) and lack of feeling secure in relationships. This longitudinal study aimed to examine the prevalence of PTSD symptoms over time, the relationship between adult attachment styles and PTSD, as well as their association with degree of exposure, and finally to consider the distribution and the trajectory of attachment styles. The sample consisted of 235 students (M=125, F=110) who were exposed to different levels of trauma intensity in response to a bombing attack. Participants were recruited and assessed approximately 1 month and 5 months after the attack using a battery of questionnaires. Findings revealed, as expected, that 79.5% of the participants met the criteria for current probable PTSD and 78.2% endorsed one of the three insecure attachment dimensions at baseline, which declined over time. Correlational analyses revealed a significant positive relationship between intensity of exposure and both PTSD symptoms and insecure attachment. The results confirm and extend previous findings on the association between direct exposure to life-threatening situation and the risk of behavioural and emotional problems among civilians, which may present as non-specific psychopathology.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Biochemical and Histological Study of Aminoacylase-1 Purified from Amniotic Fluid in Rats with Oxidative Stress Induced by Lead Acetate
...Show More Authors

This work involves separating and studying the aminoacylase-1 (ACY1) of amniotic fluid from healthy pregnant, mainly one peak with higher activity has been isolated by DEAE-Cellulose ion exchange from the proteinous supernatant produced by deposition of proteins using ammonium sulfate  (65%) after dialysis. The purification folds reaching to 19 folds also gave one protein peak when injected into the gel filtration column, a high ACY1 purity was obtained, with 38 folds of purification. It was found that the molecular weight of the isolated ACY1 was up to 46698 Dalton when using gel chromatography technique.The effect of ACY1 isolate was studied on rats with oxidative stress caused by lead acetate(LA) at 40 mg / kg body weight and compare

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Tue Apr 18 2023
Journal Name
Al–bahith Al–a'alami
Media policy and its impact on the level of objectivity in the Iraqi media : A study from the communicators’ point of view in the Iraqi medi outlets for the period from (1/5/2021 to 1/9/2021)
...Show More Authors

The research aims to reveal the impact of media policy in Iraqi media outlets on the level of objectivity in these outlets. A study from the communicators’ point of view where the researcher used a survey method on the communicators in media outlets to reveal the extent of media policies knowledge as well as the pressures exerted by this policy on communicators in media outlets. It also reveals the extent of their commitment to objectivity, neutrality in dealing with information and the way used to transfer it.
The research sample included (179) respondents from communicators in a range of Media outlets such as (Press, Radio, and Television), The researcher was careful with the diversity of the sample, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Journal Of The College Of Education For Women
Constructing Imminent Carcinogenic Attack in English and Arabic Scientific Discourse: A Corpus-Based Contrastive Study
...Show More Authors

Cancer is one of the critical health concerns. Health authorities around the world have devoted great attention to cancer and cancer causing factors to achieve control against the increasing rate of cancer. Carcinogens are the most salient factors that are accused of causing a considerable rate of cancer cases. Scientists, in different fields of knowledge, keep warning people of the imminent attack of carcinogens which are surrounding people in the environment and may launch their attack at any moment. The present paper aims to investigate the linguistic construction of the imminent carcinogen attack in English and Arabic scientific discourse. Such an investigation contributes to enhancing the scientists’ awareness of the linguistic co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 09 2025
Journal Name
Journal Of Legal Sciences
Criminal intent in terrorist crime
...Show More Authors

Terrorism is an old phenomenon, but awareness of its seriousness talk of where to stretch the impact of the terrorist crime and the magnitude of the results as well as the community's awareness of the newly therefore appeared studies and special laws to deal with this phenomenon, especially that this phenomenon has increased the time being to enter an organization where the scientific methods and modern techniques that cause destruction and horror of mass.That the term terrorism in the modern era did not materialize and actually only in 1793 and that was when he declared Robespierre (Robespierre) the beginning of the reign of terror or Alrhb (Reign of terror) which lasted in France from March 10 1973_27 July 1794 where it was the execution

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 20 2019
Journal Name
Political Sciences Journal
Patterns of active relation between federal authority and government council not organized into a region
...Show More Authors

The local authority represented by the Provincial Council and the administrative units thereof has legislative and supervisory functions which are in the administration and supervision of the local public utilities as provided for by the laws in force. The subject of the interactive relationship between the federal authority and the provincial councils not organized in one of the main problems that accompanied the emergence and application of decentralized system Iraq after 2003, which began since the writing of the Constitution in force for the year 2005 and the law of the provinces No. 21 of 2008 This law has been subjected to political recordings that eventually led to the appearance of this consensus image. The weakness of the legisl

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 31 2024
Journal Name
Iraqi Journal Of Political Science
Terrorist organizations employ technological development to threaten international security and stability
...Show More Authors

Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,

... Show More
View Publication
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Synthesis, characterization and antimicrobial Studies of complexes of some metal ions with 5(2-hydroxy benzylidine) -2-thio ether -1, 3, 4-thiadiazole
...Show More Authors

A new series of Fe (III) , Co (II) , Ni (II) and Cu (II) complexes of the Schiff base, 5 (2-hydroxy benzylidine) -2-thio ether -1, 3, 4-thiadiazole were prepared and characterized .The imine behaves as a bidentate. The nature of bonding and the stereochemistry of the complexes were deduced from metal analyses, infrared, electronic spectra,magnetic susceptibility and conductivity measurements, an octahedral geometry was suggested for all complexes except the copper complex has a square planar geometry .preliminary in vitro tests for antimicrobial activity show that all the prepared compounds except iron complex display good activity to gram positive Staphelococcus aures and gram negative Escherchia coli.

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 21 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Estimation of the reliability system in model of stress- strength according to distribution of inverse Rayleigh
...Show More Authors

View Publication
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Lamport
Cryptanalysis for Brute Force Attack and XOR Ciphering Methods
...Show More Authors