The current theoretical research targeted to construct a model of terrorist personality and its differentiation from psychopathic personality . Several assumptions or theories of perspectives of psychopathic personality have been compared with the terrorist personality studies that concerned . The suggested theoretical model is interrupting the terrorist personality . The conclusions , discussions are mentioned. Finally, recommendation is suggested .
The increase of the scenographic designer role on account of the character of the director in the Iraqi theater constituted a clear phenomenon that has been manifested in many shows, which necessitated a stance on the nature of this relation and delimiting the work space for each one of them inside the theater show. The research focuses on determining the work relation between the directorial vision and the scenographic proposal in the Iraq theater show. The research is divided into four chapters, the first one addressed the methodological framework, where the research problem was stated in the following question (has the scenographic designer been able through his scenographic proposal to remove the director from his position being the
... Show MoreThe current study aims to identify:The meta-motivation and Uniqueness seeking of the study sample. The correlated relationship among them. The present study sample consists of (400) students from the colleges of engineering, University of Baghdad, and the University of Technology in the academic year (2019-2020), and the researcher has adopted the Chen Scale (1995)to measure the meta-motivation after its translation into Arabic by(Al-Samawi,2011).The scale includes six dimensions. The researcher has also adopted the Snyder&Fromkin scale (1980) to measure the uniqueness seeking after translating and adapting it into the Arabic environment. The scale consists of three dimensions. The results show that students of the Facult
... Show MoreIt is frequently asserted that an advantage of a binary search tree implementation of a set over linked list implementation is that for reasonably well balanced binary search trees the average search time (to discover whether or not a particular element is present in the set) is O(log N) to the base 2 where N is the number of element in the set (the size of the tree). This paper presents an experiment for measuring and comparing the obtained binary search tree time with the expected time (theoretical), this experiment proved the correctness of the hypothesis, the experiment is carried out using a program in turbo Pascal with recursion technique implementation and a statistical method to prove th
... Show More(3) (PDF) Theoretical calculation of the electronic current at N3 contact with TiO2 solar cell devices. Available from: https://www.researchgate.net/publication/362780274_Theoretical_calculation_of_the_electronic_current_at_N3_contact_with_TiO2_solar_cell_devices [accessed May 01 2023].
In this study, a theoretical scenario has been used to calculate the electronic current in sensitizer N3 molecule contact to TiO2 semiconductor for electrons in functional solar cells. It is known to play an important role on the compute the eficiency of solar cell. Some parameters of electronic current such as the transition energy, driving force energy, barrier height coupling overlapping values are determined. Transition energy is a necessary parameter to calculate the electronic current in solar cell with using wide polarity solvents Acetic acid, 2-Methoxyethanol, 1-Butanol, Methyl alcohol, chloroform, N,N-Dimethylacetamide and Ethyl alcohol via the quantum donor-acceptor system. Here, we show the results of transition energy can be var
... Show MoreA computer theoretical s1udy has been carried out in field of opto - clcctroniccs, to design an electron gun using the space charge effect.
The distribution of axial potential upon the two -electrode
immersion lens of (L=l4mm) has been carried out using Poisons equation and the tinite clement method; knowing the first 11nd second derivation of the axial potential and the solution of paraxial ray equation, the optical prop
... Show MoreThis study includes design and synthesis of new non-steroidal anti-inflammatory agents (NSAIDs) with expected cyclooxygenase-2 (COX-2) selective inhibition to achieve better activity and low gastric side effects. Two series of compounds have been designed and synthesized as potential NSAIDs,these are: Salicylamide derivatives (compounds 3,4,5 ) and Diflunisal derivatives (compounds 10&11). In vivo acute anti-inflammatory effect of one of the synthesized agents (compound 3) was evaluated in the rat using egg-white induced paw edema model of inflammation. Preliminary pharmacological study revealed that compound 3 exhibited less anti-inflammatory effect compared to that of aspirin after
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More