Preferred Language
Articles
/
Qxea-o0BVTCNdQwCJCtg
The Effect of Flow as a Strategy on EFL Student-teachers' Performance and their Flow
...Show More Authors

This study aims at suggesting flow as a strategy for training female EFL student-teachers in the teaching training course and finding out the effect of this strategy on their performance and their flow state. The training course syllabuses will be constructed according to the flow nine factors and the teaching skills. The measurement tools are the student-teacher performance checklist that has already been used by the department of English language and SHORT Flow State Scale (S FSS-2). The study population is represented with the (60) female student-teachers/ fourth stage/ evening studies at theEnglish department /college of education for women/the University of Baghdad. The study is used the experimental design in that (30) of the student-teachers are selected randomly and divided into two groups (15) student-teachers for the experimental group, trained according to the flow strategy, and (15) for control one, trained according to the conventional way. The flow state is investigated and used for comparing the two groups. After gathering the data and analyzing them statistically, the results show that the strategy has influenced the experimental group students' performance and their flow state. Accordingly, the recommendation indicates the importance of incorporating the flow in the teacher education programs, and the suggestions are given to study the flow in in-service EFL teachers and to make further studies concerning the flow and positive psychology of the EFL teacher.

Scopus
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
International Journal Of Renewable Energy Research
Economic and Environmental Feasibility of Constructing a Grid-Connected Sun-Tracking PV Power Plant in Iraq
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Mon Jan 16 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
Dependence Severity, Locus of Control, and Readiness to Change in Male Alcoholic Clients: A Correlational Study
...Show More Authors

Objectives: To assess the level of dependence severity, locus of control, and readiness to change in male alcohol clients and measure the correlation between dependence with a locus of control and readiness to change.

Methodology: A descriptive correlational design was conducted in the substance use rehabilitation centers at psychiatric teaching hospitals in Baghdad city from November /2021 to May 2022. The instrument of the study was designed by using sociodemographic, the clinical characteristics of the client, the Short-form Alcohol Dependence Data Questionnaire (SADD), Drinking Related Internal-External Locus of Control Scale: (DRIE), and the Stages of Change Readiness and Treatment Eagerness Scale (SOCRATES). The data was co

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (30)
Crossref (16)
Scopus Crossref
Publication Date
Tue Sep 05 2023
Journal Name
Iraqi Post Graduate Medical Journal.
Immunohistochemical Expression of Carbonic Anhydrase IX and PAX8 in Renal Cell Carcinoma: A Clinicopathological Correlation Study.
...Show More Authors

Publication Date
Thu Mar 25 2021
Journal Name
International Journal Of Drug Delivery Technology
A comparative study of retinol-binding protein-4 and progranulin in iraqi women with thyroid disorder
...Show More Authors

Thyroid hormones (TH) regulate the metabolic processes required for normal development and growth; also, to organizemetabolism in adults, any defect in thyroid function leads to abnormality in thyroid hormones level. The current study hasbeen designed to find the relationship between retinol-binding protein-4 and progranulin in the serum of Iraqi women withhypothyroidism and hyperthyroidism, also, to study whether these patients are exposed to a risk of developing diabetes mellitus,and PGRN may be a biomarker in detection early stage of diabetes mellitus.Materials and Methods: in this study, serum samples were obtained from 50 Iraqis women patients, [25 patients withhypothyroidism (G2) and 25 patients with hyperthyroidism (G3)] in addition

... Show More
Scopus (3)
Scopus
Publication Date
Mon Jan 01 2024
Journal Name
Optical Materials
Design and analysis of a high sensitivity open microchannel PCF-based surface plasmon resonance refractometric sensor
...Show More Authors

View Publication
Scopus (31)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Applied Energy
Solidification enhancement of PCM in a triplex-tube thermal energy storage system with nanoparticles and fins
...Show More Authors

View Publication
Scopus (300)
Crossref (284)
Scopus Clarivate Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref