AS Muhsen, International Journal of Psychosocial Rehabilitation (1475-7192), 2020 - Cited by 1
The research aims to find out the effect of PEDODE Strategy on the acquisition of historical concepts of First Intermediate Grade. To achieve this goal, the researcher has put forward this zero hypothesis: There is no statistically significant difference at the level of (05,0) between the mean of the students' marks in the experimental group who study the history subject using PEDODE strategy and that of the students' marks in the control group who study the subject according to the traditional method in the post-testing on the acquisition of historical concepts. The sample of the study consists of (62 female-students) of First Intermediate Grade in the Directorate of Baghdad Education/ Karkh2nd for the academic year 2016-2017. The sampl
... Show MoreThis study was designed to investigate the effect of aqueous extract of ginger Zingiber officinale Roscoe on the histology of corpus luteum and the concentration of the hormones progesterone and estrogen during the first trimester of pregnancy (0 - 7) days from fertilization. 30 pregnant mice were divided into five experimental groups: control group (administrated with distilled water), and four groups treated at doses (284, 568, 1136,1420 mg / kg), orally administrated , daily with (0.1 ml). Microscopic examination results have shown histopathological changes in corpus luteum included: Pyknosis in some nuclei of granulosa cells, Karyorrhexis, Karyolysis in some granulosa cells, and necrosis in corpus luteum, with additional significant dec
... Show MoreThe present study discusses the names of the Day of Resurrection in Uri Rubin’s translations of the Holy Qur’an. To identify the translation difficulties and complications and to find out the Hebrew equivalence, the study, through the application of a comparative analytical approach, aims at analyzing the linguistic structures of Day of Resurrection names cited in the Holy Qur’an. Heavenly religions are rich with distinct and unique terms that distinguish and reflect their specificity of other religions; something requires a great accuracy in the translation of such terminology. By investigating selected examples of the names of the Day of Resurrection in Arabic and Hebrew, the present study sheds light on the morphological and semant
... Show MoreThe study aimed to clarify the meanings learned and inferred from reading books، letters and messages in Surat Al-Qur’an. The inductive method، the analytical method، and the deductive method، One of the most prominent results of the research: that the multiplicity of Qur’anic readings produces a variety and expansion in the meaning that has a clear impact on the interpretation by clarifying the meaning of the verse.
Abstract
It is clear to everyone how important it is to implement transactions electronically, as it facilitates the provision of services to beneficiaries, whether individuals or institutions, to achieve many benefits that are not exclusive to the beneficiary or the applicant, but extends to the governmental and international bodies. And the number of users has reached millions since its emergence in 1995, because the concepts of electronic transactions have great advantages for the economy in general and the banking sector in particular, so cooperation in various fields with the aim of becoming an information society has become paramount, It allows customers to pay money to any company they want t
... Show MoreConjugated Linoleic Acid (CLA) is an essential polyunsaturated omega fatty acid that occurs naturally in vegetable oils. It also plays an important role in preserving meat for longer periods by preventing oxidation of other fats. Thus, it can be used in the production of functional foods with high biological value and low cholesterol levels by adding poultry diets. Objective: The aim of the present study was to evaluate the effect of adding CLA to broiler diets on production performance and fatty acid content in the meat. Methodology: One-day-old Ross-308 chicks were randomly distributed into four dietary treatment groups: control (0 g CLA kgG1 diet; A1), 0.5 g CLA kgG1 diet (A2), 0.75 g CLA kgG1 diet (A3) and 1 g CLA kgG1 diet (A4). Diets
... Show MoreOne of the main parts in hydraulic system is directional control valve, which is needed in order to operate hydraulic actuator. Practically, a conventional directional control valve has complex construction and moving parts, such as spool. Alternatively, a proposed Magneto-rheological (MR) directional control valve can offer a better solution without any moving parts by means of MR fluid. MR fluid consists of stable suspension of micro-sized magnetic particles dispersed in carrier medium like hydrocarbon oil. The main objectives of this present research are to design a MR directional control valve using MR fluid, to analyse its magnetic circuit using FEMM software, and to study and simulate the performance of this valve. In this research, a
... Show MoreThis work is concerned with designing two types of controllers, a PID and a Fuzzy PID, to be used
for flying and stabilizing a quadcopter. The designed controllers have been tuned, tested, and
compared using two performance indices which are the Integral Square Error (ISE) and the Integral
Absolute Error (IAE), and also some response characteristics like the rise time, overshoot, settling
time, and the steady state error. To try and test the controllers, a quadcopter mathematical model has
been developed. The model concentrated on the rotational dynamics of the quadcopter, i.e. the roll,
pitch, and yaw variables. The work has been simulated with “MATLAB”. To make testing the
simulated model and the controllers m
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More