The research aims to identify the relationship between employing future skills during teaching from the viewpoint of students of Islamic studies at the Northern Border University, as well as their attitudes towards future professions. The researcher employed the correlational descriptive approach. The tools were a questionnaire for employing future skills, and a scale for the attitude towards the future profession. The two research tools were applied to a random sample of (242) male and female students from the department of Islamic Studies, College of Education and Arts. The findings showed that the total level of employing future skills and their three axes during teaching was average. It was also found that the attitude towards future
... Show MoreIn light of the increasing importance of interim financial statements they provided these lists of information that enables users of accounting information to make wise investment decisions and predict the company's activities in light of changes the updated rather than wait until the end of the year and accessing information provided by the annual financial statements. In light of this research has come to the most important set of conclusions the adoption of interim financial information has been audited by the external auditor to the availability of basic qualitative characteristics in the accounting information contained in the (appropriate and timely manner, reliability and comparability) and this in turn leads to the impact on reli
... Show MoreThis study aims to identify the degree of students of Princess Rahma University College owning e-learning skills related to MOODLE as they perceived in the of light Corona crisis. The researchers' questionnaire consisted of (37) items, distributed in three areas of e-learning skills related to the MOODLE on (147) students were chosen randomly. The results of the study showed that the degree of students 'possession of e-learning skills related to the MOODLE was significant. The results also revealed that there were statistically significant differences in the degree of students' possession of electronic learning skills related to the MOODLE due to sex in favor of females. Finally, there were no statistically significant differences in the
... Show MoreThis research aims to modify the components of stainless steel alloy by the method of surface engineering through the single diffusion coating technique in order to obtain new alloys with high efficiency in resisting harsh environmental conditions. Steam a mixture of sodium chloride ( ) and sodium sulfate ( ) at a temperature of 900 and then compare it with the base alloy. The results showed that the alloys produced in this way are very efficient. The results showed that the aluminum coating showed high efficiency in resisting oxidation and provided better protection for a longer time compared to the uncoated alloy due to the oxide crust layer formed with high adhesion as well as the aluminum-rich phases, whether the phase
... Show MoreThe fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi
... Show MoreThis review delves deep into the intricate relationship between urban planning and flood risk management, tracing its historical trajectory and the evolution of methodologies over time. Traditionally, urban centers prioritized defensive measures, like dikes and levees, with an emphasis on immediate solutions over long-term resilience. These practices, though effective in the short term, often overlooked broader environmental implications and the necessity for holistic planning. However, as urban areas burgeoned and climate change introduced new challenges, there has been a marked shift in approach. Modern urban planning now emphasizes integrated blue-green infrastructure, aiming to harmonize human habitation with water cycles. Resil
... Show MoreThe existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet. Maintaining solidity and integrity of a blockchain’s transactions is an important issue, which must always be borne in mind. Transactions in blockchain are based on use of public and private keys asymmetric cryptography. This work proposes usage of users’ DNA as a supporting technology for storing and recovering their keys in case those keys are lost — as an effective bio-cryptographic recovery method. The RSA private key is
... Show MoreWeb testing is very important method for users and developers because it gives the ability to detect errors in applications and check their quality to perform services to users performance abilities, user interface, security and other different types of web testing that may occur in web application. This paper focuses on a major branch of the performance testing, which is called the load testing. Load testing depends on an important elements called request time and response time. From these elements, it can be decided if the performance time of a web application is good or not. In the experimental results, the load testing applied on the website (http://ihcoedu.uobaghdad.edu.iq) the main home page and all the science departments pages. In t
... Show MoreThe modern systems that have been based upon the hash function are more suitable compared to the conventional systems; however, the complicated algorithms for the generation of the invertible functions have a high level of time consumption. With the use of the GAs, the key strength is enhanced, which results in ultimately making the entire algorithm sufficient. Initially, the process of the key generation is performed by using the results of n-queen problem that is solved by the genetic algorithm, with the use of a random number generator and through the application of the GA operations. Ultimately, the encryption of the data is performed with the use of the Modified Reverse Encryption Algorithm (MREA). It was noticed that the
... Show More