Preferred Language
Articles
/
jperc-250
Prevalence of Posttraumatic Stress Symptomatology and Distribution of Attachment Patterns 1 and 5 Months after a Terrorist Attack
...Show More Authors

As a consequence of a terrorist attack, people may experience posttraumatic stress disorder (PTSD) and lack of feeling secure in relationships. This longitudinal study aimed to examine the prevalence of PTSD symptoms over time, the relationship between adult attachment styles and PTSD, as well as their association with degree of exposure, and finally to consider the distribution and the trajectory of attachment styles. The sample consisted of 235 students (M=125, F=110) who were exposed to different levels of trauma intensity in response to a bombing attack. Participants were recruited and assessed approximately 1 month and 5 months after the attack using a battery of questionnaires. Findings revealed, as expected, that 79.5% of the participants met the criteria for current probable PTSD and 78.2% endorsed one of the three insecure attachment dimensions at baseline, which declined over time. Correlational analyses revealed a significant positive relationship between intensity of exposure and both PTSD symptoms and insecure attachment. The results confirm and extend previous findings on the association between direct exposure to life-threatening situation and the risk of behavioural and emotional problems among civilians, which may present as non-specific psychopathology.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
International Dental Journal
A Survey of Systemic Antibiotic Prescription Patterns Amongst Iraqi Dentists
...Show More Authors

View Publication
Scopus (6)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Thu Mar 02 2023
Journal Name
Applied Sciences
Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review
...Show More Authors

The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach

... Show More
View Publication Preview PDF
Scopus (91)
Crossref (83)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Al–bahith Al–a'alami
Persuasive Sentimental Method in the Electronic Newspapers of Terrorist Organizations - A research drawn from a Master Degree thesis
...Show More Authors

The paper probes into minute identification of the data of the methods followed in the electronic newspapers that aim to promote terrorist organizations like Al Qaeda and ISIS to draw emotional empathy and sympathy with them.
The paper aims at identifying:
How emotional empathy was utilized by terrorists in E-newspapers.
How useful utilizing emotional empathy was in attracting supporters. The sample that is used in the paper is based on the opening articles of E-newspapers that propagate Al Qaeda and ISIS, e.g. (Sawtu el jihad) “The Sound of Fighting in the Name of God”, (Mua’skar el Battar wal Shamikha wal Khansaa) “Camps of Al Battar, Shamika, and Khansaa”, “Inspire” and (Thurwatu el Sanam, Dabiq, and Rumiyah)

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Thu Jun 30 2016
Journal Name
Al-kindy College Medical Journal
Secondary skull tumors: Prevalence, MRI findings as a diagnostic tool, and treatment
...Show More Authors

Background: Skull secondary tumors are malignant bone tumors which are increasing in incidence.Objective: The objectives of this study were to present clinical features , asses the outcome of patients with secondary skull tumors ,characterize the MRI features, locations, and extent of secondary skull tumors to determine the frequency of the symptomatic disease.Type of the study: This is a prospective study.Methods: This is a prospective study from February 2000 to February 2008. The patients were selected from five neurosurgical centers and one oncology hospital in Baghdad/Iraq. The inclusion criteria were MRI study of the head(either as an initial radiological study or following head CT scan when secondary brain tumor is suspected , vis

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Educational And Psychological Researches
Perceptual Speed and Its Relation to the Emotional Patterns of University Students: Perceptual Speed and Its Relation to the Emotional Patterns of University Students
...Show More Authors

 

The current research aims to identify the perceptual speed of the university students as well as to identify the differences in the level of perceptual speed for the university students according to the variables of (male, female) specialization (scientific, human) university (Baghdad, Mustansiriya). Additionally, the research aims to identify the prevalence of emotional pattern and to identify the relationship between perceptual speed and the emotional patterns among university students. The researcher designed a questionnaire to measure the Emotional Patterns based on Jerome Freedman perspective. As for perceptual speed, the researcher adopted French, Extrom and Price scale (1963), which was tran

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 18 2004
Journal Name
Iraqi Journal Of Laser
Quantum Cryptography and a Quantum Key Distribution Protocol
...Show More Authors

In this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.

View Publication Preview PDF
Publication Date
Fri Sep 01 2017
Journal Name
J Indian Soc Periodontol.
The association between receptor activator of nuclear factor kappa-β ligand and clinical attachment level among waterpipe smoker
...Show More Authors

Scopus
Publication Date
Thu May 25 2023
Journal Name
Results In Chemistry
Synthesis and characterization of (E)-4-(((4-(5-mercapto-1, 3, 4-oxadiazol-2-yl) phenyl) amino) methyl)-2-methoxyphenol as a novel corrosion inhibitor for mild-steel in acidic medium
...Show More Authors

Metal corrosion is a destructive process for many industrial operations, including oil well acidizing and acid pickling. Therefore, numerous efforts made by many researchers to control the steel corrosion. In the present work, A (E)-4-(((4-(5-mercapto-1,3,4-oxadiazol-2-yl) phenyl) amino) methyl)-2-methoxyphenol (MOPM) has been synthesized and characterized as a new corrosion inhibitor for mild steel in 0.1 M hydrochloric acid. FTIR and 1 HNMR were used in the diagnosis of MOPM, while electrochemical polarization technique was employed to test the performance of inhibitor at various temperatures and inhibitor concentrations. Electrochemical studies showed that MOPM acts as a mixed-type inhibitor with a maximum inhibition efficiency of

... Show More
Publication Date
Sun Jan 01 2023
Journal Name
Results In Chemistry
Synthesis and characterization of (E)-4-(((4-(5-mercapto-1, 3, 4-oxadiazol-2-yl) phenyl) amino) methyl)-2-methoxyphenol as a novel corrosion inhibitor for mild-steel in acidic medium
...Show More Authors

View Publication
Scopus (13)
Crossref (13)
Scopus Crossref