The research aims to recognize the impact of the training program based on integrating future thinking skills and classroom interaction patterns for mathematics teachers and providing their students with creative solution skills. To achieve the goal of the research, the following hypothesis was formulated: There is no statistically significant difference at the level (0.05) between the mean scores of students of mathematics teachers whose teachers trained according to the proposed training program (the experimental group) and whose teachers were not trained according to the proposed training program (the control group) in Pre-post creative solution skills test. Research sample is consisted of (31) teachers and schools were distribut
... Show More
Iraqi conventional gasoline characterized by its low octane number not exceed 82 and high lead and sulfur content. In this paper tri-component or ternary, blends of gasoline, ethanol, and methanol presented as an alternative fuel for Iraqi conventional gasoline. The study conducted by using GEM blend that equals E85 blend in octane rating. The used GEM selected from Turner, 2010 collection. G37 E20 M43 (37% gasoline + 20% ethanol+ 43% methanol) was chosen as GEM in present study. This blend used in multi-cylinder Mercedes engine, and the engine performance, and emitted emissions compared with that produced by a gasoline engine.
The results show that this blend can formulate with available Iraqi pro
... Show MoreThis work is based on the synthesis of Cobalt(II) and Cadmium(II) mixed-ligands compounds obtained from the reaction of N'-(4-methylsulfanyl-benzoyl)-hydrazine carbodithioic acid methyl ester as a ligand and using ethylendiamine (en), 2,2'-bipyridine (bipy) or 1,10-phenanthroline (phen) as a co-ligand. The synthesis of ligand (HL) was based on multi-steps synthetic procedure. The reaction of 4-methylsulfanyl-benzoyl chloride with hydrazine gave 4-methylsulfanyl-benzoic acid hydrazide. This compound was reacted with carbon disulfide and potassium hydroxide in methanol to yield N'-(4-methylsulfanylbenzoyl)-hydrazine potassium thiocarbamate, which upon reaction with methyl iodide resulted in the formation of the ligand. A range of physico-chem
... Show MoreEmbedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.
Abstract* Backgrounds The retention of the maxillary complete denture may be influenced by adequate recording in the patient’s mouth, marking, and carving of the post-dam on the maxillary cast. Failure to do so may lead to loss of retention. Successful denture construction with patient’s comfort could be achieved by effective methods of recording, marking, and carving of the post-dam. The aim of the study was to assess Iraqi dentists in their knowledge and application of the post-dam in maxillary complete dentures. Methods Questionnaires were distributed randomly through online Google Forms and 118 Iraqi dentists with different academic degree participated in the study. A multinomial logistic regression model was also used to ass
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThe objective of this study was to investigate the levels of depression, anxiety, and stress among dentists during covid-19 lockdown and to investigate the relationship between stress and each mental health state.
A cross-sectional survey on 269 dentists was conducted using DASS-21 and PHQ-9 questionnaires. Bivariate and multivariate models were constructed and the odds ratio (OR) was calculated to assess the strength of the association between an independent categorical variable and the outcome.
Being unsatisfied with the job was as
Abadan, one of the modernists, is the critics, whose words depend on the wound, the modification and the ills of the hadeeth.
He lived Abadan, age in the request to talk and take the elders, and Awali, and attribution, which affected him by taking, and update about (300) Sheikh or more.
Abadan also excelled in the novel and its origins, which made students talk to him, and ask for the novel, with his hardness and hardship. As we will see in the folds of the search
A submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .