Preferred Language
Articles
/
jperc-256
Standraidization of Post traumatic Stress Disorder Scale on Students of University of Baghdad
...Show More Authors

There are a lot of measures for Post Traumatic Stress Disorder (PTSD), but what distinguishes it from other measures is the number of short paragraphs and concise depending on the classification of American Psychiatric Association (APA), which can be applied by the researchers on a large number, Because the Iraqi society suffered from psychological trauma due to wars, conflicts and occupation and the resulting psychological disorders of the members of Iraqi society, especially post-traumatic stress disorder, as mentioned by many studies and researches.

Therefore, the aim of this study was to standardize the PTSD scale for students at Baghdad University. For the Psychologist Fua . E. which was applied in many foreign studies. 


This measure was applied to a sample of (800) students (400 male, 400 female) from the University of Baghdad.
The standardization of this measure has passed through many stages of scientific procedures in this research. This measure has been included in the 23 paragraph in the initial picture. However, after the application of the research procedures of sincerity and stability and statistical operations, there remain 17 paragraphs in its final form. Note that each phrase contains four different alternatives to the level of severity. This measure was consistently high by using the alpha-cronbach and half-flux coefficient. It also used the global application, which was characterized by high public honesty.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 28 2021
Journal Name
Journal Of The College Of Education For Women
The Effectiveness of a Structural Theory- based Training Program in Enhancing Arabic Language Teachers’ Teaching Practices and their Tendencies towards Structural Teaching: مريم بنت حسن البلوشي، ريا بنت سالم المنذري، علي مهدي كاظم
...Show More Authors

The study aims to identify the effectiveness of a structural theory-based training program in enhancing the teaching practices of Arabic language teachers teaching grade ten in South Al Batinah in Sultanate of Oman. The study used the quasi-experimental design, and the sample consisted of 40 male and female teachers. To achieve the objectives of the study, a training program, an observation form and a measurement tool of teachers’ tendencies towards a structural teaching were made. The program was implemented with an experimental group of 20 female and male teachers in the first semester of the academic year 2018/2019. The study has found that there is a statistically significant difference between the average grades before and after i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2012
Journal Name
Al–bahith Al–a'alami
Technical Construction of Advertisements in Radio of the Republic of Iraq
...Show More Authors

Studies and scientific research conducted in the field of communication have shown that broadcasting has a clear impact on the ideas, attitudes and behavior of the masses if it is better used in making the media message studied.

The role of this means is not only to present opinions and ideas, but also to influence trends by supporting or changing them. This is of course a matter for the nature of the content in terms of its formulation and the way it is prepared and presented. The power and appeal of a radio message is not complete by simply creating content without creating a distinctive design; and to what extent this content depends on the logic and psychology of persuasion.

The conviction of the cont

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Transparency and Its Impact on Achieving The Organizational Reputation.
...Show More Authors

 This research test the relationship and the effect of an explanatory variable transparency in the organizational reputation responder variable by senior management in the departments of the Ministry of Housing and Construction centrally funded, As well as come  out among other recommendations contribute to the achievement of organizational reputation of the organizations surveyed. Given the importance of the research topic for the public sector and the community and the environment in which they operate researcher designed questionnaire containing (30) items, and collected data from (92) respondents, representing the research community (eight establishments) exclusively and comprehensively, relying descriptive analytic

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jun 11 2021
Journal Name
Journal Of Computing And Information Technology
A Survey on Emotion Recognition for Human Robot Interaction
...Show More Authors

With the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (6)
Scopus Crossref
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Mon Jul 01 2019
Journal Name
Arpn Journal Of Engineering And Applied Sciences
PSEUDO RANDOM NUMBER GENERATOR BASED ON NEURO-FUZZY MODELS
...Show More Authors

Producing pseudo-random numbers (PRN) with high performance is one of the important issues that attract many researchers today. This paper suggests pseudo-random number generator models that integrate Hopfield Neural Network (HNN) with fuzzy logic system to improve the randomness of the Hopfield Pseudo-random generator. The fuzzy logic system has been introduced to control the update of HNN parameters. The proposed model is compared with three state-ofthe-art baselines the results analysis using National Institute of Standards and Technology (NIST) statistical test and ENT test shows that the projected model is statistically significant in comparison to the baselines and this demonstrates the competency of neuro-fuzzy based model to produce

... Show More
View Publication
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Laboratory Investigation on Roller Compaction Technique in Concrete Construction
...Show More Authors

Roller compacted concrete (RCC) is a concrete compacted by roller compaction. The concrete mixture in its unhardened state must support a roller while being compacted. The aim of this research work was to investigate the behavior and properties of roller compacted concrete when constructed in the laboratory using roller compactor manufactured in local market to simulate the field conditions. The roller compaction was conducts in three stages; each stage has different loading and number of passes of the roller. For the first stage, a load of (24) kg and (5) passes in each direction had been employed. For the second stage, a load of (104) kg and (10) passes in each direction were conducted. Finally, at the third stage, a load of (183) kg a

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Multifocus Images Fusion Based On Homogenity and Edges Measures
...Show More Authors

Image fusion is one of the most important techniques in digital image processing, includes the development of software to make the integration of multiple sets of data for the same location; It is one of the new fields adopted in solve the problems of the digital image, and produce high-quality images contains on more information for the purposes of interpretation, classification, segmentation and compression, etc. In this research, there is a solution of problems faced by different digital images such as multi focus images through a simulation process using the camera to the work of the fuse of various digital images based on previously adopted fusion techniques such as arithmetic techniques (BT, CNT and MLT), statistical techniques (LMM,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Computer Science And Mobile Computing
Image Compression based on Non-Linear Polynomial Prediction Model
...Show More Authors

Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref