Abstract [email protected] Background: Acute Traumatic Stress Disorder (ATSD) might be complicated by Post Traumatic Stress Disorder (PTSD). Psychological First Aid (PFA) said to be helpful to reduce the possibility of reduction of ASD and PTSD symptoms. PFA is simple procedure to deliver help & support to victims, may be by some one close to him, quietly and professionally. Iraq has and is still experiencing, continuous traumatic stresses. ATSD is especially seen in war such as during the Gulf War, Embargo and nowadays under the current American occupation. With the extreme shortage of recourses and the given late priority to psychological problems and intervention have disastrous consequences on the psycho-social wellbeing of peop
... Show MoreIn this research, nanofibers have been prepared by using an electrospinning method. Three types of polymer (PVA, VC, PMMA) have been used with different concentration. The applied voltage and the gap length were changed. It was observed that VC is the best polymer than the other types of polymers.
This work aims to analyze a three-dimensional discrete-time biological system, a prey-predator model with a constant harvesting amount. The stage structure lies in the predator species. This analysis is done by finding all possible equilibria and investigating their stability. In order to get an optimal harvesting strategy, we suppose that harvesting is to be a non-constant rate. Finally, numerical simulations are given to confirm the outcome of mathematical analysis.
This paper aims at analyzing Terry Bisson’s short story Bears Discover Fire stylistically by following both Gerard Genette’s theory of narratology (1980) and Short and Leech (1981) strategy for analyzing fictional works. Also trying to examine to what extent these models are applicable in analyzing the selected story. Stylistic analysis procedures help the readers/researchers to identify specific linguistic features in order to support literary interpretation and appreciation of literary texts. Style in fiction concentrates not on what is written, but on how a text is written. Each writer has his own style and techniques which distinguish him from other writers
Abstract: In this research, nanofibers have been prepared by using an electrospinning method. Three types of polymer (PVA, VC, PMMA) have been used with different concentration. The applied voltage and the gap length were changed. It was observed that VC is the best polymer than the other types of polymers.
Purpose/objective:
1 - To explain the financial impact of the activities and areas of human resources management and the adoption of the methodology for estimating costs on the basis of conduct and statement of how to assess costs and benefits of human resource activities.
2 - Measuring human capital, and its impact on the financial statements.
Design/methodology/approach:
Concentrated dimensions of the research paper's lack of financial statements prepared by the organizations for information mandated human resource its components of the three (attraction - development
... Show MoreThe antimicrobial activity of two naphthoquinone semicarbazone derivatives (Two newly synthesized compounds) have been studied by using tube — diluation and disc plate technique. The effect of those derivatives upon pathogenic microorganism iso-lated from specimen(urine iwounds,stool, swabs, throat ....etc) have been studied also in comparison with the antibiotics (amikacin,ampicillin, carbencillin, cephalothin, cefoxitin,clindamycin ,erythromycin,gentamycin,penicillin,tetracylin and tri-methoprim. It was shown that derivative(1) had more effective against micro organ-ism than derivative(11).
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show More
