Preferred Language
Articles
/
DxePnZABVTCNdQwCFY8C
E-Learning Applications According To The Levels Of STEM Literacy For Teachers Of Physics At The Secondary Stage
...Show More Authors

E-learning applications according to the levels of enlightenment (STEM Literacy) for physics teachers in the secondary stage. The sample consists of (400) teachers, at a rate of (200) males (50%), and (200)females (50%), distributed over (6) directorates of education in Baghdad governorate on both sides of Rusafa and Karkh. To verify the research goals, the researcher built a scale of e-learning applications according to the levels of STEM Literacy, which consists of (50) items distributed over (5) levels. The face validity of the scale and its stability were verified by extracting the stability coefficient through the internal consistency method “Alf-Cronbach”. The following statistical means were used: Pearson correlation coefficient, arithmetic mean, and standard deviation, where the result was reached that secondary school physics teachers have e-learning applications according to (STEM Literacy) levels. In light of this, the researcher presented a set of recommendations and suggestions.

Publication Date
Sat Mar 30 2024
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Optimization of Separator Size and Operating Pressure for Three-phase Separators in the West Qurna1 Oil Field
...Show More Authors

An optimization study was conducted to determine the optimal operating pressure for the oil and gas separation vessels in the West Qurna 1 oil field. The ASPEN HYSYS software was employed as an effective tool to analyze the optimal pressure for the second and third-stage separators while maintaining a constant operating pressure for the first stage. The analysis involved 10 cases for each separation stage, revealing that the operating pressure of 3.0 Kg/cm2 and 0.7 Kg/cm2 for the second and third stages, respectively, yielded the optimum oil recovery to the flow tank. These pressure set points were selected based on serval factors including API gravity, oil formation volume factor, and gas-oil ratio from the flow tank.    To impro

... Show More
Preview PDF
Crossref
Publication Date
Mon Mar 25 2019
Journal Name
Al-academy
The Use of Arabic Calligraphy Items in Decorative Designs for Islamic Fabrics and Costumes: الهام طاهر حسين
...Show More Authors

The Arabic calligraphy, in the early days of Islam, was used for the purpose of decorating the walls of mosques from inside and outside. Hence, this decorative art must be actively involved in enriching the designs of Islamic fabrics and costumes because it has a highly qualified and aesthetically pleasing look and expresses the originality of the Arab spirit. The research is divided into two section: the first section included the following topics: First "A historical overview of the art of decoration in Islamic Arab thought". Second "linear formations of decorative designs, and the subject of intellectual aesthetic taste of the art of decorating. This section tackles two subsections: first "the beauty of thought between the function an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 08 2015
Journal Name
Chemical And Process Engineering Research
Uni and Simplex Optimization for the Spectrophotometric Determination of Erythromycin ethylsuccinate Drug via Charge-Transfer Complex Formation
...Show More Authors

Charge transfer complex formation method has been applied for the spectrophotometric determination of erythromycin ethylsuccinate, in bulk sample and dosage form. The method was accurate, simple, rapid, inexpensive and sensitive depending on the formed charge- transfer complex between cited drug and, 2,3- Dichloro-5,6-dicyano-p- benzoquinone (DDQ) as a chromogenic reagent. The formed complex shows absorbance maxima at 587 nm against reagent blank. The calibration graph is linear in the ranges of (10 - 110) μg.mL-1 with detection limit of 0.351μg.mL-1. The results show the absence of interferences from the excipients on the determination of the drug. Therefore the proposed method has been successfully applied for the determination of eryth

... Show More
Preview PDF
Publication Date
Sat Jun 19 2021
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Serum Chitotriosidase level as a Novel Biomarker for Therapeutic Monitoring of Nephropathic Cystinosis among the Iraqi children
...Show More Authors

Background: Cystinosis is a rare autosomal recessive lysosomal storage disease with high morbidity and mortality. It is caused by mutations in the CTNS gene that encodes the cystine transporter, cystinosin, which leads to lysosomal cystine accumulation. It is the major cause of inherited Fanconi syndrome, and should be suspected in young children with failure to thrive and signs of renal proximal tubular damage. The diagnosis can be missed in infants, because not all signs of renal Fanconi syndrome are present during the first months of life. Elevated white blood cell cystine content is the cornerstone of the diagnosis. Since chitotriosidase (CHIT1 or chitinase-1) is mainly produced by activated macrophages both in normal and inflammator

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Iraqi Journal Of Physics
Comparative study of the linear and nonlinear optical properties for different Iraqi heavy and light crude oils
...Show More Authors

Iraqi oil crudes have some of the physical and chemical characteristics that distinguish it from other types of oil crudes in the world. Some of these features such us molecular composition, rheological, viscosity and emulsions are studied carefully by researchers. In this work, a comparative study of the linear and the non-linear optical properties for typical heavy and light crude oils of Iraqi origin was studied utilizing Z-scan technique. The He -Ne laser of wavelength 632.8 nm had been used for this purpose. These samples were collected from Basra and Kut oil fields. The values of the non-linear refractive index (n2), non-linear absorption coefficient (β), and third-order electrical susceptibility (χ3) were e

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
The Effect of Social Responsibility initiatives in Financial Performance on economic unit and create value for it
...Show More Authors

        Many of researchers have written about social responsibility and business strategy and competitive advantage, and they have given particular attention to the relationship between economic and social responsibility , but what is missing in this aspect is how the economic units that use their core competencies to advance social responsibility initiatives so that they can achieve a significant competitive advantage and create value for it ?

The current research aims to verify the view that "the economic and social objectives in the long term is not contradictory in nature but complementary objectives essential", as well as make sure that the s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Swarm And Evolutionary Computation
Improving the performance of evolutionary multi-objective co-clustering models for community detection in complex social networks
...Show More Authors

Scopus (34)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Al-khwarizmi Engineering Journal
Development of an ANN Model for RGB Color Classification using the Dataset Extracted from a Fabricated Colorimeter
...Show More Authors

 

Codes of red, green, and blue data (RGB) extracted from a lab-fabricated colorimeter device were used to build a proposed classifier with the objective of classifying colors of objects based on defined categories of fundamental colors. Primary, secondary, and tertiary colors namely red, green, orange, yellow, pink, purple, blue, brown, grey, white, and black, were employed in machine learning (ML) by applying an artificial neural network (ANN) algorithm using Python. The classifier, which was based on the ANN algorithm, required a definition of the mentioned eleven colors in the form of RGB codes in order to acquire the capability of classification. The software's capacity to forecast the color of the code that belongs to an ob

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (22)
Crossref (10)
Scopus Crossref