Preferred Language
Articles
/
jperc-449
Posttraumatic growth in Iraqi women who have lost close relatives
...Show More Authors

During recent decades, hundreds of thousands of Iraqis lost their lives as a result of wars, economic blockade, or acts of violence and terrorism. The loss of a family member, especially husband makes women suddenly bears full responsibility for the family. Lost could impose new changes in psychological, social, and economical roles. These changes usually combine with the negative effects aftermath the lost trauma. Some of the reports in Iraq showed there were increased and huge numbers of widows and orphans. This study aimed to identify the aspects of Posttraumatic Growth (PTG) in Iraq women who lost their close relatives (especially husbands). 52 of Iraqi women who lost their husband and 49 women who experienced other traumatic events participated in the study. Posttraumatic Growth Inventory was used to collect data. The results showed that women who lost their husband had different levels of growth. There were no significant differences in all growth areas according variables: state of losing (killing or unknown) , number of lost person.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Apr 08 1999
Journal Name
Abhath Al- Yarmouk [basic Sciences And Engineering]
Model for Predicting the Cracking Moment in Structural Concrete Members
...Show More Authors

Publication Date
Wed Feb 01 2017
Journal Name
International Journal Of Science And Research (ijsr)
Supra-Approximation Spaces Using Mixed Degree System in Graph Theory
...Show More Authors

This paper is concerned with introducing and studying the o-space by using out degree system (resp. i-space by using in degree system) which are the core concept in this paper. In addition, the m-lower approximations, the m-upper approximations and ospace and i-space. Furthermore, we introduce near supraopen (near supraclosed) d. g.'s. Finally, the supra-lower approximation, supraupper approximation, supra-accuracy are defined and some of its properties are investigated.

Publication Date
Mon Jan 01 2018
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Treatment of Sulfate in Sand by Using Magnetic Water Process
...Show More Authors

One of the most important problems in concrete production in Iraq and other country is the high sulfate content in sand that led to damage of concrete and hence reduces its compressive strength and may leads to cracking due to internal sulfate attack and delay ettringite formation. The magnetic water treatment process is adopted in this study. Many samples with different SO3 content are treated with magnetic water (12, 8, 4 and 2)L that needed for each 1kg of sand with the magnetic intensity (9000 and 5000) Gaus. The magnetic water needed is reduced with less SO3 content in sand. The ACI 211.1-91 concrete mix design was used in this research with slump range (75- 100) mm and the specified compressive strength (35MPa). The compressive streng

... Show More
Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
2019 12th International Conference On Developments In Esystems Engineering (dese)
Structural Modeling of Cross-Frame Behavior in Steel Girder Bridges
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Jan 23 2009
Journal Name
Journal Of College Of Education Al-mustansiriya University
Interaction of Thereonine in aqueous Dimethylformamide solution at deferent temperatures
...Show More Authors

Publication Date
Fri Nov 19 2010
Journal Name
مجلة جامعة كربلاء
Interaction of Cysteine in aqueous Dimethylformamide solution at deferent temperatures
...Show More Authors

Publication Date
Sun Jan 01 2023
Journal Name
International Conference Of Computational Methods In Sciences And Engineering Iccmse 2021
Cubic bipolar ideals of a semi group in KU-Algebra
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Natural Remedies
ABORTION IN THE EYES OF THE CHRISTIAN RELIGION/ DESCRIPTIVE STUDY
...Show More Authors

Christianity rejected abortion, since its inception, it took a luck against abortion, although there is no mention of it in the Bible, as there is no explicit text for abortion in the Old or New Testament and that the early Christians considered abortion a sin in all stages, and beliefs included abortion as an act of murder. What is forbidden in the Ten Commandments is “Thou shalt not kill”, and it is understood that killing here is either plundering one’s personal life (suicide) or stealing another person’s life (killing), or stealing the life of a person who has not yet been born (aborting fetuses). Based on the above, it was necessary for individuals to search for (Abortion in the Christian Religion / Descriptive Study) The resea

... Show More
Preview PDF
Publication Date
Thu Apr 30 2020
Journal Name
The Asian Esp Journal
A Linguistic Study of ''and'' (و) in Arabic and English.
...Show More Authors

The conjunctive ''and'' and its Arabic counterpart ''و'' are discourse markers that express certain meanings and presuppose the presence of other elements in discourse. They are indispensable aids to both the text writers and readers. The present study aims to show that such cohesive ties help the writer to organize his main argument and communicate his ideas vividly and smoothly. They also serve as explicit signals that help readers unfold text and follow its threads as realized in the progression of context. The researcher has utilized the Quirk Model of Semantic Implication for data analysis. A total of 42 (22 for English and 20 for Arabic) political texts selected from different elite newspapers in both Arabic and English for the analy

... Show More
Publication Date
Sat Sep 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
The Factors Affecting on Managing Sensitive Data in Cloud Computing
...Show More Authors

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref