A CRITICAL OVERVIEW IN SELECTED POEMS
The present study was conducted to estimate the antimicrobial activity and the potential biological control of the killer toxin produced by
Off-nucleus isotropic magnetic shielding (σiso(r)) and multi-points nucleus independent chemical shift (NICS(0-2 Å)) index were utilized to find the impacts of the isomerization of gas-phase furfuraldehyde (FD) on bonding and aromaticity of FD. Multidimensional (1D to 3D) grids of ghost atoms (bqs) were used as local magnetic probes to evaluate σiso(r) through gauge-including atomic orbitals (GIAO) at density functional theory (DFT) and B3LYP functional/6-311+G(d,p) basis set level of theory. 1D σiso(r) responses along each bond of FD were examined. Also, a σiso(r) 2D-scan was performed to obtain σiso(r) behavior at vertical heights of 0–1 Å above the FD plane in its cis, transition state (TS) and trans forms. New techniques fo
... Show MoreThe research seeks to identify the effectiveness of a selective program in modifying irrational thinking that causes anger among an important class of societies in general. namely teachers. Specifically female teachers because of the pressures they suffer because of the nature of this profession. It may develop into anger outburst, which may cause irrational thinking arose as a result of the different situations they are going through. The sample of the program consisted of (12) teachers in Egypt, from different educational sectors. The researcher intended to clarify the emotion of anger and the irrational thoughts associated with it and the contribution of the selective counseling program in modifying those irrational thinking. This was
... Show MoreThe aim of the present research is to measure the degree of strategic effectiveness (fahs) in the development of grammar skills of high school students in the Kingdom of Saudi Arabia and to achieve the goal of the researcher the researcher used the semi-experimental approach; On ten arbitrators specializing in grammar, morphology, curricula and methods of teaching the Arabic language. After confirming the validity of the guideline, the researcher prepared an achievement test consisting of (22) paragraphs of the type of short answer and multiple choice. The researcher trained a teacher to apply the strategy to the experimental research sample using the (screening) component of (30) students, and the same parameter taught the control sampl
... Show MoreIn this research, the problem of ambiguity of the data for the project of establishing the typical reform complex in Basrah Governorate was eliminated. The blurry of the data represented by the time and cost of the activities was eliminated by using the Ranking function and converting them into normal numbers. Scheduling and managing the Project in the Critical Pathway (CPM) method to find the project completion time in normal conditions in the presence of non-traditional relationships between the activities and the existence of the lead and lag periods. The MS Project was used to find the critical path. The results showed that the project completion time (1309.5) dinars and the total cost has reached (33113017769) dinars and the
... Show MoreThis work aimed to design and testing of a computer program – based eyeQ improvement, photographic memory enhancement, and speed reading to match the reading speed 150 – 250 word per minute (WPM) with the mind ability of processing and eye snap shooting 5000WPM . The package designed based on Visual Basic 6. The efficiency of the designed program was tested on a 10 persons with different levels of education and ages and the results show an increase in their reading speed of approximately 25% in the first month of training with noticeable enhancement in the memory as well as an increase in the ability to read for longer time without feeling nerves or boring, a nonlinear continuously increase in reading speed is assured after the first mo
... Show MoreA security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear
... Show More