استهدفت الدراسة الكشف عن العلاقة بين نوعين من الدوافع و الجنس و العمر, تكونت العينة من (132) من طلبة الجامعة . (75) من الاناث و (57) من الذكور من الذين تراوحت اعمارهم مابين (18-26) سنة . استجاب الطلبة الى قائمة الدوافع ما بين الاشخاص المرتبطة بالنزوع الى الاعتداء ، كان قد قيس بها الغفران ، و قد توصل البحث الى النتائج الاتية : اشارت النتائج الى انه توجد فروقا ذات دلالة احصائية بين الجنسين في دافع الانتقام و لكن ليس في دافع التجنب ، و تشير النتائج بانه لا توجد فروقا ذات دلالة بين الاعمار الاصغر و الاكبر .
Abstract
Objectives: This study aimed to evaluate the effectiveness of an educational program on nurses' practices concerning therapeutic communication.
Methodology: A quasi experimental design was carried out at Karbala Center for Cardiac Diseases and Surgery, Imam Hussein Medical City and Al-Handia General Hospital for period 10th June 2017 to the 15th of August 2018.
The program and instruments were constructed and developed by the researcher to measure the purpose of the study. Purposive sample comprised of (57) nurses were divided into two groups, study and control groups. The questionnaire consisted from two parts, first part is related to nurses' demographic characteristics and second part which include practices checkl
The present study aims at identifying the styles, procedures of Iraqi universities to avoid plagiarism and evaluate these steps, also to evaluate the form prepared by the Directory of Scientific Supervision and Evaluation, Ministry of Higher Education and Scientific Research. The study uses documentary style, 150 teachers in the following colleges (Education Ibn Rushd, Languages and Arts) in university of Baghdad whom already used the aforementioned list were the sample of the study and they asked to give their opinions about the list.The study consists of five sections, first one deals with general view, second explains plagiarism and its types, shapes and reasons,third tackles with ways of detecting plagiarism, its programs, consequences
... Show MoreThe article is final after making all the modifications. 2,259 / 5,000 يهدف البحث إلى قياس وتحليل الفجوة بين الواقع الفعلي لبنود التخطيط والدعم وفق المواصفة (IATF16949:2016) في مصنع البطاريات أحد مصانع الشركة العامة لصناعة وتجهيز السيارات، وكذلك التعرف على نقاط القوة والضعف لبنود التخطيط والدعم وفق المواصفة محل البحث. ينطلق البحث من حاجة الشركة العامة لصناعة وتجهيز السيارات إلى إتباع المعايير العالمية في صناعة السيارات والمنتجات المرتبطة بها،
... Show MoreIn this work, the fractional damped Burger's equation (FDBE) formula = 0,
The research demonstrates new species of the games by applying separation axioms via sets, where the relationships between the various species that were specified and the strategy of winning and losing to any one of the players, and their relationship with the concepts of separation axioms via sets have been studied.
The study aimed to reveal the level of knowledge and tendencies of high- study students specializing in curriculum and teaching methods at King Khalid University towards harmonious strategies with brain-based learning (BBL). And Then, putting a proposed concept to develop knowledge and tendencies of high-study students specializing in curriculum and teaching methods at King Khalid University towards harmonious strategies with Brain-based learning (BBL). For achieving this goal, a cognitive test and a scale of tendency were prepared to apply harmonious strategies with brain-based learning. The descriptive approach was used because it suits the goals of the study. The study sample consisted of (70) male and female students of postgraduate
... Show MoreIn this paper, double Sumudu and double Elzaki transforms methods are used to compute the numerical solutions for some types of fractional order partial differential equations with constant coefficients and explaining the efficiently of the method by illustrating some numerical examples that are computed by using Mathcad 15.and graphic in Matlab R2015a.
Graph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.
The study aims at analyzing the inconsistent structural and semantic aspects found in the plays of N.A Ostrovsky. The analysis, that includes all the linguistics schools of thoughts in modern Russian language, is performed chronologically to clarify all the ambiguities that the Russian language learners may face. Such difficulties lie in the use of inconsistent aspects with complete declarative sentences and adverbial clauses. Hence, it constructs a new sentence category that consists of secondary clause and its syncretism semantic.
The study illustrates the wide scope of both studying the sentence inconsistent
... Show MoreRecently, the phenomenon of the spread of fake news or misinformation in most fields has taken on a wide resonance in societies. Combating this phenomenon and detecting misleading information manually is rather boring, takes a long time, and impractical. It is therefore necessary to rely on the fields of artificial intelligence to solve this problem. As such, this study aims to use deep learning techniques to detect Arabic fake news based on Arabic dataset called the AraNews dataset. This dataset contains news articles covering multiple fields such as politics, economy, culture, sports and others. A Hybrid Deep Neural Network has been proposed to improve accuracy. This network focuses on the properties of both the Text-Convolution Neural
... Show More