DBN Dr. Liqaa Habeb, International Journal of Multidisciplinary Reseach, 2015
The current study aims to
1) identify the prevalent Enneagram personality types and the academic self among the sixth-grade students of the distinguished secondary schools; 2) the differences of relationship between the Enneagram personality types and the academic self-concept based on gender; 3) identify the correlation between the Enneagram personality types and the academic self-concept; and 4) identify the contribution of each type of personality types to the academic self-concept. To this end, two instrument were used to collect the data: Riso-Hudson’s scale,1995 was administered to measure enneagram types which had translated to the Arabic language by ( al-yassery,2004), the other instrument was
... Show MoreThis paper investigates the interaction between fiscal and monetary policy in Iraq after 2003 using the prisoner’s dilemma.The paper aims to determine the best form of coordination between these policies to achieve their goals; payoff matrix for both policies was constructed. To achieve the purpose, the quantitative approach was applied using several methods, including regression, building payoff matrices and decision analysis using a number of software.The results of the monetary policy payment function show that inflation rate has an inverse relationship with the auctions of selling foreign currency and a positive relationship with the government’s activity, while the fiscal policy function shows that real growth is positively
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MorePhotodetector based on Rutile and Anatase TiO2 nanostructures/n-Si Heterojunction
This study explores the barriers to adopting green environmental criteria in Supplier Selection (SS) within the Iraqi food industry. It aims to enhance the understanding of sustainable supply chain management in developing nations, with a particular focus on the Iraqi context. A case study approach was utilized to identify eleven key green environmental criteria and 54 sub-criteria, alongside seven major barriers to their adoption. The Best–Worst Method (BWM) was employed to rank the criteria, and Fuzzy Stepwise Weight Assessment Ratio Analysis (SWARA) was used to prioritize the barriers. The analysis revealed that Environmental Management Systems are the most critical criterion for SS. On the other hand, legislation and policies emerged
... Show MoreBackground: Women with previous two or
more caesarean deliveries are usually
managed by elective cesarean section to avoid
the possible risks of labor.
Objective: To compare the relative risks of
maternal and fetal outcomes in emergency
versus elective previous two or more
caesarean deliveries
Design: Randomized prospective clinical
study
Setting: Al-Elweya Maternity Teaching
Hospital, from 1st of March to 31st of
September 2008.
Methods: The study groups, those who had
previous two or more caesarean deliveries,
were included from the hospital admissions.
The 1st group (102 women) presented in labor
and was managed by caesarean delivery as
soon as it was possible. The second group (7
To improve the efficiency of a processor in recent multiprocessor systems to deal with data, cache memories are used to access data instead of main memory which reduces the latency of delay time. In such systems, when installing different caches in different processors in shared memory architecture, the difficulties appear when there is a need to maintain consistency between the cache memories of different processors. So, cache coherency protocol is very important in such kinds of system. MSI, MESI, MOSI, MOESI, etc. are the famous protocols to solve cache coherency problem. We have proposed in this research integrating two states of MESI's cache coherence protocol which are Exclusive and Modified, which responds to a request from reading
... Show More