The purpose of this study was to investigate the effect of a Cognitive- Behavioral Training Program in reducing Problems Solving among a sample of education university College Students, the study sample consisted of (50) students were randomly assigned to two groups: experimental, and control; (25) students per group, the results of (ANOVA) revealed that there were significant differences at (p < 0.05) between experimental and control group in Problems Solving level, while there were significant differences between both groups in achievement. The researchers recommended further studies on the other variables which after training students on the method of solving problems and techniques to reduce stress.
Abstract
The researcher seeks, through different aspects of the search, to reach a set of objective concerning in content creation a clear vision about conceptual and practical dimension of relation and effects between (Leader-Member Exchange, and Organizational Commitment) to construct a framework of a pragmatic model as a solution to research problem and it questions. The theoretical problem is derived basically from the scarcity of Arab studies and researches that deal by study and analyses for such important of The two variables blend. The practical problem depends in deriving from reality of every day work in the Iraqi ministry of defense.
On this basis, a formula of research problem for pur
... Show MoreOne of the difficulties that the kindergarten institution face is the lack of specialized teachers to work with the children at the kindergarten age for the majority of this stage teachers were prepared to teaech in the elementary stage while the kindergarten child needs ateacher who is aware of the characteristics and the demands of his growth and his behavioral emotional and social problems.
Therefore the best teacher must be chosen for the kindergarten and qualifying her educationally in all that this qualifying includes of knowledge's.
The aims of the research:
The present research aims at the identification of the n
... Show MoreAn experimental and numerical study was carried out to investigate the heat transfer by natural convection in a three dimensional annulus enclosure filled with porous media (silica sand) between two inclined concentric cylinders with (and without) annular fins attached to the inner cylinder under steady state condition. The experiments were carried out for a range of modified Rayleigh number (0.2 ≤Ra*≤ 11) and extended to Ra*=500 for numerical study and for annulus inclination angle of (δ = 0˚, 30˚, 60˚ and 90˚). The numerical study was to give the governing equation under assumptions that used Darcy law and Boussinesq’s approximation and then it was solved numerically using finite difference approximation. It was found that t
... Show MoreIn this paper, we employ the maximum likelihood estimator in addition to the shrinkage estimation procedure to estimate the system reliability (
The aim: Infection with the hepatitis B virus (HBV) caused by blood transfusion is a big problem throughout the world. The aim of study is to determine the faster and more accurate methods for detection of hepatitis B infections by serological screening and PCR- amplification. Materials and methods: A total of 140528 donors were tested for HBsAg and total anti-HBc from January to October 2021 in Iraq’s National Blood Transfusion Center; however, only 100 samples with HBsAg (-) and anti-HBc (+) were collected and tested for HBV DNA using quantitative real-time PCR. Results: From 2015 to 2021, the percentage of HBsAg positive donors was 0.33 percent in 2015, 0.32 percent in 2016, 0.30 percent in 2017, 0.28 percent in 2018, 0.23 pe
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More
This research dealt with highlighting the images of marriage through the modern means of communication and the legal ruling for it. Dowry even be knotted on them; because they are then one of the parties to the contract and contracted in one contract, and this is prohibited by law and law and common sense.
It turns out that it is permissible to advertise marriage through the Internet in accordance with the rules and standards that preserve values and morals and safeguard dignity and chastity. The acts in Islamic law are vested with intentions. If intentions are true, then the act is true, and Internet marriage is what falls under this order.<
... Show More