This study was conducted to determine the relationship between test anxiety and cognitive representation among university students. To this end, 152 student (male, female) were chosen randomly from scientific and social departments to fill out the questionnaires of test anxiety and cognitive representation. The researcher utilized Independent Samples T-Test, Pearson product-moment correlation coefficient, Cronbach's alpha and T-Test in his study. The result revealed that there were negative and a weak correlation between test anxiety and cognitive representation among university students.
Both religions have urged (honoring parents and kin) through the texts that came in their original sources, as honoring parents means showing respect to them In word and deed, and carrying in our hearts an appreciation for their status, and God commands to honor parents; Becausee this is Important in the eyes of God that he includeincludeed it in the Ten Commandmen.
The expanding use of multi-processor supercomputers has made a significant impact on the speed and size of many problems. The adaptation of standard Message Passing Interface protocol (MPI) has enabled programmers to write portable and efficient codes across a wide variety of parallel architectures. Sorting is one of the most common operations performed by a computer. Because sorted data are easier to manipulate than randomly ordered data, many algorithms require sorted data. Sorting is of additional importance to parallel computing because of its close relation to the task of routing data among processes, which is an essential part of many parallel algorithms. In this paper, sequential sorting algorithms, the parallel implementation of man
... Show MoreResearch on geopolitical and geopolitical studies relates to a range of sciences that can be called auxiliary sciences, such as political science, international relations in particular, and history, but their focus is rarely on science and ethnography
That the issues and problems of the world today has become so large and complex that does not allow a specific field or knowledge to solve one of the need for the newly known knowledge integration (geopolitics and geopolitics) in particular to move towards cognitive integration to understand many of the problems and global issues that faced The importance of this study comes to clarify the relationship between Darwinism, geopolitics and geopolitics. The geopolitics in modern terms d
... Show MoreRecently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show Moreيهدف البحث الى دراسة وتحليل الهندسة المتزامنة (CE) وتحسين التكلفة(CO)، واستعمال مخرجات الهندسة المتزامنة كمدخلات لتحسين التكلفة، وبيان دور الهندسة المتزامنة في تحسين جودة المنتوج، وتحقيق وفورات في وقت التصميم والتصنيع والتجميع وتخفيض التكاليف، فضلاً عن توظيف بعض النماذج لتحديد مقدار الوفورات في الوقت ومنها نموذج(Lexmark) ونموذج (Pert) لتحديد الوفورات في وقت التصميم وقت لتصنيع والتجميع. ولتحقيق اهداف
... Show Moren this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary func
... Show MoreA description of the implementation of integrated practical work in a remote laboratory was presented in this paper. The student, in real time, can access an online web page in order to manipulate a practical work of digital electronics. This work is based on the use of an embedded system PcDuino. The hardware architecture and software solutions are described, as well as the supervision tool that allows the student to follow changes in the output states of the Practical Work remotely.
A laboratory experiment was carried out in the laboratories of College of Agricultural Engineering Sciences, University of Baghdad in 2017. Three factors were studied; Sorghum bicolor L. cultivars (Inqath, Rabeh and Buhoth70), primed and unprimed seed, and salt stress (0, 6, 9 and 12 dS.m−1). The aim was to improve germination and seedling growth under salt stress. The results showed significant superiority of Buhoth70 cultivar compared to others, significantly superiority of primed seed compared to the unprimed and significant negative impact as long as increasing levels of salt stress at germination ratio, plumule length, dry seedling weight and seedling vigor index. The interaction between cultivars, priming and salt stress showed that
... Show MoreThe main purpose of this paper is to study feebly open and feebly closed mappings and we proved several results about that by using some concepts of topological feebly open and feebly closed sets , semi open (- closed ) set , gs-(sg-) closed set and composition of mappings.