As a consequence of a terrorist attack, people may experience posttraumatic stress disorder (PTSD) and lack of feeling secure in relationships. This longitudinal study aimed to examine the prevalence of PTSD symptoms over time, the relationship between adult attachment styles and PTSD, as well as their association with degree of exposure, and finally to consider the distribution and the trajectory of attachment styles. The sample consisted of 235 students (M=125, F=110) who were exposed to different levels of trauma intensity in response to a bombing attack. Participants were recruited and assessed approximately 1 month and 5 months after the attack using a battery of questionnaires. Findings revealed, as expected, that 79.5% of the participants met the criteria for current probable PTSD and 78.2% endorsed one of the three insecure attachment dimensions at baseline, which declined over time. Correlational analyses revealed a significant positive relationship between intensity of exposure and both PTSD symptoms and insecure attachment. The results confirm and extend previous findings on the association between direct exposure to life-threatening situation and the risk of behavioural and emotional problems among civilians, which may present as non-specific psychopathology.
The current research aims to identify the perceptual speed of the university students as well as to identify the differences in the level of perceptual speed for the university students according to the variables of (male, female) specialization (scientific, human) university (Baghdad, Mustansiriya). Additionally, the research aims to identify the prevalence of emotional pattern and to identify the relationship between perceptual speed and the emotional patterns among university students. The researcher designed a questionnaire to measure the Emotional Patterns based on Jerome Freedman perspective. As for perceptual speed, the researcher adopted French, Extrom and Price scale (1963), which was tran
... Show MoreKinematics is the mechanics branch which dealswith the movement of the bodies without taking the force into account. In robots, the forward kinematics and inverse kinematics are important in determining the position and orientation of the end-effector to perform multi-tasks. This paper presented the inverse kinematics analysis for a 5 DOF robotic arm using the robotics toolbox of MATLAB and the Denavit-Hartenberg (D-H) parameters were used to represent the links and joints of the robotic arm. A geometric approach was used in the inverse kinematics solution to determine the joints angles of the robotic arm and the path of the robotic arm was divided into successive lines to accomplish the required tasks of the robotic arm.Therefore, this
... Show MoreIn this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.
The paper probes into minute identification of the data of the methods followed in the electronic newspapers that aim to promote terrorist organizations like Al Qaeda and ISIS to draw emotional empathy and sympathy with them.
The paper aims at identifying:
How emotional empathy was utilized by terrorists in E-newspapers.
How useful utilizing emotional empathy was in attracting supporters. The sample that is used in the paper is based on the opening articles of E-newspapers that propagate Al Qaeda and ISIS, e.g. (Sawtu el jihad) “The Sound of Fighting in the Name of God”, (Mua’skar el Battar wal Shamikha wal Khansaa) “Camps of Al Battar, Shamika, and Khansaa”, “Inspire” and (Thurwatu el Sanam, Dabiq, and Rumiyah)
Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreThe parameter and system reliability in stress-strength model are estimated in this paper when the system contains several parallel components that have strengths subjects to common stress in case when the stress and strengths follow Generalized Inverse Rayleigh distribution by using different Bayesian estimation methods. Monte Carlo simulation introduced to compare among the proposal methods based on the Mean squared Error criteria.
The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreN-Benzylidene m-nitrobenzeneamines (Schiff bases) were prepared by condensation of m-nitroaniline with aromatic aldehydes. These Schiff bases were found to react with maleic anhydride to give 2-Aryl-3-(m-nitrophenyl)-2, 3-dihydro [1, 3] oxazepine–4, 7–diones and with phthalic anhydride to give 2-Aryl-3–(m-nitrophenyl)–2, 3–dihydrobenz|| 1, 2-e|||| 1, 3] oxazepine–4, 7-diones which were reacted with pyrrolidine to give the anilide–pyrrolidides of maleic acid and phthalic acid.
In this work pyrazolin derivatives were prepared from the diazonium chloride salt of 4-aminobenzoic acid. Azo compounds were prepared from the reaction of an ethanolic solution of sodium acetate and calculated amount of active methylene compound namely, acetyl acetone to obtain the corresponding hydrazono derivative (1). Cyclocondensation reaction of compounds (1) with hydrazine hydrate and phenyl hydrazine in boiling ethanol affording the corresponding pyrazoline-5-one derivatives of 4-aminobenzoic acid (2,3). Then compound (3) was reacted with thionyl chloride to give the corresponding acid chloride derivative(4), followed by conversion into the corresponding acid hydrazide derivative (5) carboxylic acid thiosemicarbazide (11), esters
... Show MoreBackground: Skull secondary tumors are malignant bone tumors which are increasing in incidence.Objective: The objectives of this study were to present clinical features , asses the outcome of patients with secondary skull tumors ,characterize the MRI features, locations, and extent of secondary skull tumors to determine the frequency of the symptomatic disease.Type of the study: This is a prospective study.Methods: This is a prospective study from February 2000 to February 2008. The patients were selected from five neurosurgical centers and one oncology hospital in Baghdad/Iraq. The inclusion criteria were MRI study of the head(either as an initial radiological study or following head CT scan when secondary brain tumor is suspected , vis
... Show More