During recent decades, hundreds of thousands of Iraqis lost their lives as a result of wars, economic blockade, or acts of violence and terrorism. The loss of a family member, especially husband makes women suddenly bears full responsibility for the family. Lost could impose new changes in psychological, social, and economical roles. These changes usually combine with the negative effects aftermath the lost trauma. Some of the reports in Iraq showed there were increased and huge numbers of widows and orphans. This study aimed to identify the aspects of Posttraumatic Growth (PTG) in Iraq women who lost their close relatives (especially husbands). 52 of Iraqi women who lost their husband and 49 women who experienced other traumatic events participated in the study. Posttraumatic Growth Inventory was used to collect data. The results showed that women who lost their husband had different levels of growth. There were no significant differences in all growth areas according variables: state of losing (killing or unknown) , number of lost person.
This paper is concerned with introducing and studying the o-space by using out degree system (resp. i-space by using in degree system) which are the core concept in this paper. In addition, the m-lower approximations, the m-upper approximations and ospace and i-space. Furthermore, we introduce near supraopen (near supraclosed) d. g.'s. Finally, the supra-lower approximation, supraupper approximation, supra-accuracy are defined and some of its properties are investigated.
One of the most important problems in concrete production in Iraq and other country is the high sulfate content in sand that led to damage of concrete and hence reduces its compressive strength and may leads to cracking due to internal sulfate attack and delay ettringite formation. The magnetic water treatment process is adopted in this study. Many samples with different SO3 content are treated with magnetic water (12, 8, 4 and 2)L that needed for each 1kg of sand with the magnetic intensity (9000 and 5000) Gaus. The magnetic water needed is reduced with less SO3 content in sand. The ACI 211.1-91 concrete mix design was used in this research with slump range (75- 100) mm and the specified compressive strength (35MPa). The compressive streng
... Show MoreChristianity rejected abortion, since its inception, it took a luck against abortion, although there is no mention of it in the Bible, as there is no explicit text for abortion in the Old or New Testament and that the early Christians considered abortion a sin in all stages, and beliefs included abortion as an act of murder. What is forbidden in the Ten Commandments is “Thou shalt not kill”, and it is understood that killing here is either plundering one’s personal life (suicide) or stealing another person’s life (killing), or stealing the life of a person who has not yet been born (aborting fetuses). Based on the above, it was necessary for individuals to search for (Abortion in the Christian Religion / Descriptive Study) The resea
... Show MoreThe conjunctive ''and'' and its Arabic counterpart ''و'' are discourse markers that express certain meanings and presuppose the presence of other elements in discourse. They are indispensable aids to both the text writers and readers. The present study aims to show that such cohesive ties help the writer to organize his main argument and communicate his ideas vividly and smoothly. They also serve as explicit signals that help readers unfold text and follow its threads as realized in the progression of context. The researcher has utilized the Quirk Model of Semantic Implication for data analysis. A total of 42 (22 for English and 20 for Arabic) political texts selected from different elite newspapers in both Arabic and English for the analy
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show More