The current research aimed to identify the level of moral identity and social affiliation among students exposed to shock pressures, as well as to reveal the relationship between these variables. To achieve these objectives, the researcher adopted the diagnostic tool for the measure of post-traumatic stress disorder (PDS-5) scale (Foa, 2013) translated to Arabic language by (Imran, 2017). The researcher also adopted the moral identity scale built by (Al-Bayati, 2015) and the measure of social affiliation built by (Al-Jashami, 2013), which were applied to a random sample of (200) male and female students chose from al Anbar University. They were exposed to shock pressures. The results of the research showed that the sample has an average
... Show MoreIn this publication, several six coordinate Co(III)-complexes are reported. The reaction of 2,3-butanedione monoxime with ethylenediamine or o-phenylenediamine in mole ratios of 2:1 gave the tetradentate imine-oxime ligands diaminoethane-N,N`-bis(2-butylidine-3-onedioxime) H2L1 and o-phenylenediamine-N,N`-bis(2-butylidine-3-onedioxime), respectively. The reaction of H2L1 and H2L2 with Co(NO3)2, and the amino acid co-ligands (glycine or serine) resulted in the formation of the required complexes. Upon complex formation, the ligands behave as a neutral tetradantate species, while the amino acid co-ligand acts as a monobasic species. The mode of bonding and overall geometry of the complexes were determined through physico-chemical and spectro
... Show MoreThis study utilizes streamline simulation to model fluid flow in the complex subsurface environment of the Mishrif reservoir in Iraq's Buzurgan oil field. The reservoir faces challenges from high-pressure depletion and a substantial increase in water cut during production, prompting the need for innovative reservoir management. The primary focus is on optimizing water injection procedures to reduce water cuts and enhance overall reservoir performance. Three waterflooding tactics were examined: normal conditions without injectors or producers, normal conditions with 30 injectors and 80 producers and streamline simulation using the frontsim simulator. Three main strategies were employed to streamline water injection in targeted areas.
... Show More
The problem with research lies in hiding the Hanbali approach in building long and short travel provisions, as well as hiding some provisions relating to short travel that are not provided for by the jurists of Hanbali (in their books).
The research aims to demonstrate the approach and standards on which they based the long and short travel provisions, as well as to reflect the provisions of some of the issues that are silent on long and short travel, with evidence and significance.
The research included a preface and two researches, the researcher in the preface talked about the reality of long and short travel, in the first research on the approach of ha
... Show MoreThe intellectual and religious characteristics were an influential presence in the same Andalusian poet, especially among the poets of Beni El-Ahmar because they are part of the heritage of poets, and that is to push them towards the glory of this heritage and to take care of it and benefit from its inclusion, inspiration and similarity.
That this inflection on the poetic heritage is justified by the poets of the sons of the Red were inclined to preserve the inherited values, especially as it was related to their poetry, especially that the Andalusian poet did not find embarrassment in the inspiration of heritage and emerged when he mentioned the homes and the ruins and the camel and the journey, although the community Andalusian
... Show MoreThe exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh
... Show MoreThe shortage in surface water quantities led to a shift in dependence on the groundwater as an alternative water source in southern parts of Iraq. The groundwater is decreasing in quantity and water quality is degrading due to different factors. Therefore, it is important to assess the groundwater quality of the Missan Governorate of the country by analyzing the physicochemical parameters and distinguishing the probable sources of contaminants in the area. The present study used water quality diagrams and statistical methods such as factor analysis and agglomerative cluster analysis to determine the sources of chemical ions in the forty-four groundwater samples collected from wells in the study area. In addition, the Water Quality Index (WQ
... Show MoreDetecting and subtracting the Motion objects from backgrounds is one of the most important areas. The development of cameras and their widespread use in most areas of security, surveillance, and others made face this problem. The difficulty of this area is unstable in the classification of the pixels (foreground or background). This paper proposed a suggested background subtraction algorithm based on the histogram. The classification threshold is adaptively calculated according to many tests. The performance of the proposed algorithms was compared with state-of-the-art methods in complex dynamic scenes.
The use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree mode
... Show MoreThe proposal of nonlinear models is one of the most important methods in time series analysis, which has a wide potential for predicting various phenomena, including physical, engineering and economic, by studying the characteristics of random disturbances in order to arrive at accurate predictions.
In this, the autoregressive model with exogenous variable was built using a threshold as the first method, using two proposed approaches that were used to determine the best cutting point of [the predictability forward (forecasting) and the predictability in the time series (prediction), through the threshold point indicator]. B-J seasonal models are used as a second method based on the principle of the two proposed approaches in dete
... Show More