The current research seeks to identify the impact of Barman's model on acquisition of the concepts of jurisprudence of worship among students of the departments of Qur'anic sciences. To achieve the research objectives, the researcher relied on the experimental method through a design with partial control by relying on two experimental groups receiving teaching by using the Barman model and a control group receives teaching through the normal method. After applying the experiment, the study reached the following results: Students of the Department of Qur’anic Sciences in general need educational programs linked to the curriculum and built on scientific foundations, according to their needs and problems (psychological, cognitive, and soc
... Show MoreThe objective of this study is to highlight the skills of office managers and it's impact on the effectiveness of time management in the institutes and faculties of middle technical university and a group of cognitive and practical aims. The managers skills forms mthe modern trend and the main source to provide organizations with highly skilled managers with distinctive performance and because of the sharp changes in the environment which today's organizations works in it , business organizations generally and managers especially realise the importance of time management and it's role in achieving competitive advantage . The problem of this study raised from this point which reflect the extent of departments managers realisation
... Show MoreThe aim of the research is to identify psychological toughness and its relationship to some coordination, physical abilities and accuracy of some basic performance skills among the players of the Iraqi junior national handball team players. The hypothesis is the existence of a correlation between psychological toughness, coordination, physical abilities, and the accuracy of some basic skills performance among the players of the Iraqi junior national handball team players. The descriptive approach in the style of correlational relations used to suit the research problem, as the community was determined by (18) players for the Iraqi junior national handball team players, while the sample was (14) players, and the samp
... Show MoreThis paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmiss
... Show MoreBackground: Tooth wear is one of the most common problems in the older dentate population which results from the interaction of three processes (attrition, abrasion and erosion) and it affects all societies, different age groups, and all cultures. This study was achieved to evaluate the prevalence and distribution of tooth wear among institutionalized residents in Baghdad city\ Iraq. Subjects and Methods: This survey was accomplished on four private and one governmental institution in Baghdad city. One-hundred twenty three (61 males, 62 females) aged 50-89 years were participated in this study. The diagnosis and recording of tooth wear were according to criteria of Smith and Knight. Results: The prevalence of tooth wear was 100% with a mean
... Show MoreSH Mahdi, AM Mahdi, KS Ismaeil, College of Education for Pure Science, Ibn-Al-Haitham, 2015 - Cited by 7
The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show MoreKE Sharquie, MM Al-Waiz, AA Noaimi, Iraqi Postgraduate Medical Journal, 2008 - Cited by 1
BACKGROUND: Sickle cell nephropathy, a heterogeneous group of renal abnormalities resulting from complex interactions of sickle cell disease (SCD)-related factors and non-SCD phenotype characteristics, is associated with an increased risk for morbidity and mortality. AIMS: The aims of this study were to determine the frequency of microalbuminuria (MA) among pediatric patients with SCD and to determine risk factors for MA among those patients. SUBJECTS AND METHODS: A case–control study was carried out on 120 patients with SCD, 2–18 years old, registered at Basrah Center for Hereditary Blood Diseases, and 132 age-and sex-matched healthy children were included as a control group. Investigations included complete blood panel, blood urea, se
... Show More