Preferred Language
Articles
/
IBZxpocBVTCNdQwC41re
The impact of an instructional-learning design based on the brain- compatible model in systemic thinking among first intermediate grade female students in Mathematics
...Show More Authors

The research aimed to identify “The impact of an instructional-learning design based on the brain- compatible model in systemic thinking among first intermediate grade female students in Mathematics”, in the day schools of the second Karkh Educational directorate.In order to achieve the research objective, the following null hypothesis was formulated:There is no statistically significant difference at the significance level (0.05) among the average scores of the experimental group students who will be taught by applying an (instructional- learning) design based to on the brain–compatible model and the average scores of the control group students who will be taught through the traditional method in the systemic thinking test.The research community was determined and represented by the intermediate and secondary day schools for girls within the Karkh II general educational directorate, and Al-Jana in Intermediate School for girls was selected, the research sample consisted of (75) female students from the first intermediate grade that were distributed as (37) students female in the first experimental group, and (38) in the control group.For the purpose of the research hypothesis testing, a systemic thinking test was built, as the test in its final form consisted of (24) essay items with restricted answers, and the test was divided into ( (2) items for each sub-skill).The appropriate statistical analysis were carried out (the difficulty coefficient and coefficient of ease, the discrimination coefficient, and the effect of wrong alternatives), and their psychometric properties were ascertained,after the statistical tools were chosen to analyze the results of the application of the test, such as using the (t-test), and the results indicated:The experimental group students who studied according to the brain concordance model out performed in the systemic thinking test on the control group students who studied according to the traditional method.

Publication Date
Tue Nov 13 2012
Journal Name
Wireless Personal Communications
Design and Implementation of a Scalable RFID-Based Attendance System with an Intelligent Scheduling Technique
...Show More Authors

View Publication
Scopus (17)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Iraqi Journal Of Science
Effects of RVLM Stimulation on Blood Pressure and Vasopressin-Like Levels in Brain Sites and Plasma are an Anesthetic Dependent. Rashid IH
...Show More Authors

The study is sought to determine specific alteration in AVP-LI level of plasma and sites of the hypothalamic-neurohypophysial-system; supraoptic nucleus (SON), paraventricular nucleus (PVN), neurointermediate lobe (NIL), and median eminence (ME), related to effects of stress of different anesthetics and electrical stimulation of RVLM/C1area. Urethane or halothane anesthetized Wistar rats were subjected to intra-RVLM electrical stimulation of 10 sec train, 1msec pulse duration at 40 Hz, and 2V every 30s.  After 30min stimulation, AVP-LI extracted from plasma, NIL, ME, SON, and PVN and measured by RIA, were compared with that of sham-stimulated urethane- or halothane-anesthetized rats and unstimulated unanesthetized control rats. Data

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 30 2021
Journal Name
Iraqi Journal Of Science
3D Model Watermarking based on Wavelet Transform
...Show More Authors

      In the last decade, 3D models gained interest in many applications, such as games, the medical field, and manufacture. It is necessary to protect these models from unauthorized copying, distribution, and editing. Digital watermarking is the best way to solve this problem. This paper introduces a robust watermarking method by embedding the watermark in the low-frequency domain, then selecting the coarsest level for embedding the watermark based on the strength factor. The invisibility of the watermark for the proposed algorithm is tested by using different measurements, such as HD and PSNR. The robustness was tested by using different types of attacks; the correlation coefficient was applied for the evaluati

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Crossref
Publication Date
Mon Feb 10 2025
Journal Name
Journal Of Baghdad College Of Dentistry
The Systemic Host Modulation Therapy of Periodontal Diseases
...Show More Authors

Background: The systemic host modulation therapy is new approach in treatment of periodontal diseases. Materials and methods:The target of this treatment is the host response to microbial infection because at present time,it is well known that most of damage found in periodontal diseases cause by the inflammatory -immune response to periodontal infections.Sub-antimicrobial-dose Doxycycline (SDD) is a 20-mg dose of Doxycycline (Periostat) that is approved and indicated as an adjunct to scaling and root planning (SRP) in the treatment of chronic periodontitis. Results:At present, SDD (Periostat) is the only systemically administered agent that is approved by the U.S. Food and Drug Administration (FDA) and accepted by the American Dental Asso

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Mar 29 2018
Journal Name
Construction Research Congress 2018
Consideration of Worker Safety in the Design Process: A Statistical-Based Approach Using Analysis of Variance (ANOVA)
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 30 2020
Journal Name
Journal Of Engineering
Design and Analysis WIMAX Network Based on Coverage Planning
...Show More Authors

In this paper, wireless network is planned; the network is predicated on the IEEE 802.16e standardization by WIMAX. The targets of this paper are coverage maximizing, service and low operational fees. WIMAX is planning through three approaches. In approach one; the WIMAX network coverage is major for extension of cell coverage, the best sites (with Band Width (BW) of 5MHz, 20MHZ per sector and four sectors per each cell). In approach two, Interference analysis in CNIR mode. In approach three of the planning, Quality of Services (QoS) is tested and evaluated. ATDI ICS software (Interference Cancellation System) using to perform styling. it shows results in planning area covered 90.49% of the Baghdad City and used 1000 mob

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 02 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Impact of Internal Islamic Certificates of Deposit (ICD) on the Profitability of Islamic Banks: an Empirical Research in Asia-Iraq Islamic Bank
...Show More Authors

 As long as Islamic banks cannot operate in an environment that deals with traditional banking instruments based on the interest rate (bank interest) that is prohibited by Article No. (6) of the Islamic Banking Law No. (43) of 2015 which stipulates that (do not deal in any activity that carries Interest (neither taking nor giving)). Therefore it seeks to provide an alternative strategic solution within the framework of the provisions and rules of Islamic Sharia, on the basis of participating in profit and loss to avoid the method of interest taking and giving, to find investment methods to provide new financial products, such as Islamic certificates of deposit and investment funds according to the method Murabaha, speculation (Mudar

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Engineering And Applied Sciences
The role of e-Government on corruption and its impact on the financial performance of the government: An empirical analysis on the Iraqi government
...Show More Authors

This study aimed to provide a conceptual model for the use and benefits of the e-Government as related to administrative fraud and financial corruption. The study also looked into their concepts, forms, dimensions and types and the role of e-Government on fraud reduction, corruption in administration and finance and its impact on the government performance. From the result, it is revealed that there is need for electronic government for implementation in order to curb the rate of fraud and administrative and financial corruption and improve the quality of service provision for better performance

Scopus (14)
Scopus
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Analysis the Impact of Corruption on Investment in Iraq
...Show More Authors

There are different types of corruptions such as administrative, political, economic and financial corruption. The corruption forms also varied such as bribery, nepotism and extortion. All types and forms of corruption play significant role in the all economic variables generally and on investments in particular, and the corruption used to be an intermediate means in reducing the rate of economic growth.  The corruption contributes in reducing the domestic investments via pay bribery by investors to officials’ persons for supplemental contracts and tenders which finally leads to reduction in the investment efficiency. The corruption also contributes in rise of operational costs for the investment projects.  In additio

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (2)
Crossref