Preferred Language
Articles
/
_xYIpocBVTCNdQwCqlnR
A training program based on integrating futuristic thinking skills with classroom interaction patterns and its effect on the academic self- efficacy of mathematics teachers
...Show More Authors

The research aims to identify the effect of the training program that is based on integrating futuristic thinking skills with classroom interaction patterns on mathematics teachers in order to provide their students with creative solution skills. The research sample consisted of 31teachers (15 teachers for the experimental group and 16 for the control groups). The researcher developed a measure for the academic self-efficacy consisting of (39) items. Its validity, reliability, coefficient of difficulty and discriminatory power were estimated. To analyze the findings, the researcher adopted the Mann-Whitney (U) test and the effect size, and the findings were as follows: There is a statistically significant difference at the significance level of (0.05) between the average scores of mathematics teachers of the experimental group and the control group on the academic self-efficacy scale.

Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Clinical And Experimental Dentistry
The effect of osseodensification on implant stability and bone density: A prospective observational study
...Show More Authors

Background: The aims of this study were to evaluate the effect of implant site preparation in low-density bone using osseodensification method in terms of implant stability changes during the osseous healing period and peri-implant bone density using CBCT. Material and methods: This prospective observational clinical study included 24 patients who received 46 dental implants that were installed in low-density bone using the osseodensification method. CBCT was used to measure the bone density pre- and postoperatively and implant stability was measured using Periotest® immediately after implant insertion and then after 6 weeks and 12 weeks postoperatively. The data were analyzed using paired t-test and the probability value <0.05 was conside

... Show More
View Publication
Scopus (21)
Crossref (23)
Scopus Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (4)
Scopus Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Fri Mar 28 2008
Journal Name
Ama, Agricultural Mechanization In Asia, Africa & Latin America
The Effect of Two Type of Plows With Four Speeds on the Field Capacity and Bulk Density
...Show More Authors

Publication Date
Thu Apr 04 2024
Journal Name
The International Tinnitus Journal
Efficacy of Sars-Cov-2 Vaccines on Severity of Coronavirus Disease in Iraq.
...Show More Authors

Vaccination against novel Coronavirus (SARS-CoV-2) become highly recommended. In Iraq, three vaccines are available. They are Pfizer-Biontech, Oxford-AstraZenica, and Sino harm vaccines. A cross-sectional retrospective study was performed to a total of 2399 individual who are vaccinated with one of the available vaccines. People who are infected with Covid-19 before and/or after vaccination of either studied SARS-CoV-2 vaccines were also involved in this study (1175 case). Signs and symptoms have been reported for each of confirmed positive cases of Coronavirus disease. Statistical data analyses were applied to reveal the effect of different SARS-CoV-2 vaccines on the incidence of novel coronavirus disease among Iraqi population. Also, the

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 24 2024
Journal Name
Annals Of Parasitology
In vitro efficacy of different concentrations of lupeol on old world Leishmania donovani
...Show More Authors

Leishmaniosis is a tropical neglected parasitic disease that is endemic in many countries, including Middle East, with no existing effective vaccines. The bite of female sand-fly transmits the causative agent, Leishmania spp., to humans. High toxicity, resistance and treatment failure of the available chemotherapy against visceral leishmaniosis demands the investigation of new anti-leishmanial compounds. Lupeol is a form of triterpene isolated from several medicinal plants and possesses an antimicrobial property. In this study, cytotoxic effect of lupeol was screened against the mammalian amastigotes form and insect promastigote form of Leishmania donovani, following three cycles of incubation at different concentrations by MTT assay. Resul

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 15 2015
Journal Name
Chemistry And Materials Research
Synthesis and Characterization of 3, 5-Dimethyl-2-(4-nitrophenyl azo)-Phenol Complexes with Co (II) and Ni (II) and Study Its Effect on the Activity of Ach Enzyme (invitro)
...Show More Authors

Preview PDF