Constructing The Psychological Tranquility Scale of the University of Baghdad Students
The research aimed to :
- Constructing the Psychological Tranquility Scale of the University of Baghdad Students.
- Appointing the psychological content standard for the accepting Answer of student about the scale.
The research Sample was (414) boy and girl from Baghdad University Students for the Studying year (2008-2009), So the Scale of the Psychological Tranquility Scale was bilt on them in good psychometric properties from truth Factor analyzing which was its super saturation was reached to (50) item from its items a value more than the super sutution norm (0,30) for kaizer, also the firm value was Relaibility for the scale by the way
A Simple, rapid and sensitive extractive and spectrophotometric method has been described for the analysis of diphenhyldramine –HCl (DPH) in pure form and in pharmaceutical formulations. The method is based on the formation of chloroform soluble ion-pair complex with Bromophenol blue(BPB) in a phthalate buffer at pH 3.0.The extracted complex shows maximum absorbance at 410 nm. Beer's law is obeyed in the concentration range 0.2-25.0 µg.ml-1. The molar absorptivity and Sandell's sensitivity for the system being 2.416x104 L.mol-1.cm-1 and 0.012µg.cm-2, respectively. The limit of detection was found to be 0.155 µg.ml-1. The proposed me
... Show MoreTime is very important in educational institutions. It is also one of our contemporary problem ‚as time is a clear – cut and limited factor‚ it demands that administrators should monitor it by administering and monitoring the principles of time.
Hence‚ the researcher attempts to identify the skills of administrating time and the reasons that cause the waste of time of the Heads of Departments at university of Baghdad.
Significance of the research:
Time is very important to all educational administrators and one of them is the institutions of Higher education. One of the
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreAgricultural lands have great importance in people's lives, and their exploitation has a great impact on strengthening the national economy. Therefore, countries have given great importance to this sector, and because of the importance of this sector, the state has given large areas of these lands to the farmers to invest in agriculture, and among these farmers are those who died and left behind children who took up crafts. Agriculture, for fear that these agricultural lands would be abandoned and turned into waste lands, a land system was introduced called (regular distribu- tion), which corresponds to (legitimate inheritance). Under this system, these lands were trans- ferred to the children of farmers who died so that the process of inve
... Show MoreNew two experiments of the three factors, in this study were constructed to investigate the effects, of the fixed variations to the box plot on subjects' judgments of the box lengths. These two experiments were constructed as an extension to the group B experiments, the ratio experiments the experiments with two variables carried out previously by Hussin, M.M. (1989, 2006, 2007). The first experiment box notch experiment, and the second experiment outlier values experiment. Subjects were asked to judge what percentage the shorter represented of the longer length in pairs of box lengths and give an estimate of percentage, one being a standard plot and the other being of a different box lengths and
... Show MoreAfter the political change in Iraq in 2003, Iraq witnessed a stage of social and political development and the strengthening of the legal foundations of the state system, by the approval of the permanent Iraqi constitution of 2005, and stipulating the quota system.
Iraqi women participated in the parliamentary elections from 2005 until 2021, and despite the participation of Iraqi women in all elections, there are challenges that women in Iraq face that prevent their political participation in general and participation in parliament in particular. There are factors behind this, including those related to Iraqi women themselves, including those concerning the political institution and factors related to the nature of society, and it
... Show MoreIn this paper, we will study non parametric model when the response variable have missing data (non response) in observations it under missing mechanisms MCAR, then we suggest Kernel-Based Non-Parametric Single-Imputation instead of missing value and compare it with Nearest Neighbor Imputation by using the simulation about some difference models and with difference cases as the sample size, variance and rate of missing data.
Research Summary
The research revolves around the collection of pending hadiths on Abdullah bin Amr bin Al-Aas, may God be pleased with them, and it is required in these hadiths that they be among those in which there is no room for diligence, such as telling about unseen matters, signs of the Hour, or a statement of virtue and reward for obedience, or punishment for disobedience.
The research consists of an introduction, two topics, and a conclusion of the first topic in the translation of Abdullah bin Amr bin Al-Aas, and the second topic, the pending hadiths of Abdullah bin Amr bin Al-Aas, may God be pleased with them, in which there is no room for diligence in collecting and studying
At the end of this rese
Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt