Current Thesis has aimed to identify : The Psychological barriers for university students , Differences in psychological barriers depending on the variable sex (Males – Females) , Adjustment to College life for university students, Differences in Adjustment to College at university life depending on the variable sex (Males – Females), and finally, The correlation between psychological barriers and Adjustment to College life. The researcher has prepared a sample consisted of (100) male and female students who were randomly selected from university students, The researcher has adopted a measure of (2002) to measure the psychological barriers, also the researcher adjustment scale with university life.
The results showed that universi
The research is an attempt to investigate experimentally the influence of teacher’s errors correction and students’ errors correction on teaching English at the College of Physical Education for Women. Errors are seen as a natural way for developing any language but teachers are puzzled the way they can correct these errors. So, this research gives some idea of using two types of errors correction. The sample of the research is female students of the first year stage at the College of Physical Education for Women of the academic year 2009-2010. The whole population of the research is (94) students while the sample is (64). Thus, the sample represents 68% from the population of the research. The sample represents It is hypothesized th
... Show MoreThe aim of the research is to examine the multiple intelligence test item selection based on Howard Gardner's MI model using the Generalized Partial Estimation Form, generalized intelligence. The researcher adopted the scale of multiple intelligences by Kardner, it consists of (102) items with eight sub-scales. The sample consisted of (550) students from Baghdad universities, Technology University, al-Mustansiriyah university, and Iraqi University for the academic year (2019/2020). It was verified assumptions theory response to a single (one-dimensional, local autonomy, the curve of individual characteristics, speed factor and application), and analysis of the data according to specimen partial appreciation of the generalized, and limits
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe scientific and technological developments and their practical applications in all fields of life in general and in the education field in specific have led to the emergence of variables in the educational structure, teaching methods and in education in their modern form which is consistent in its entirety with the spirit of the age. We today live the age of knowledge increase full of wide ranging scientific and technological developments. Thus life demands human capabilities of a special kind able to develop and innovate. Here the increasing significance emerges for taking care of the human powers through educational systems much different from those current traditional systems. System
... Show MoreThis research aims to explore the impact of strategic intelligence by his dimensions (Foresight , system thinking, vision, motivation and partnership) on decision making styles which represented by ( rational, intuitive, dependent, Spontaneous and Avoidant style) for a sample of the administrative leaders in the center of Reconstruction &Housing Ministry and Some its formations which are companies of (Sa'ad, Al Mansour, al Farouq, Assyria, al-Mu'tasim, al- Rasheed, and Public Authority for Housing). So to achieve the research objectives and to test hypotheses, it has been relying
... Show MoreThe aim of the research is to demonstrate of the relation and the influence of the components of economic intelligence (strategic alertness, information security policy, impact policy) in achieving of economic growth (creativity, competitiveness, quality improvement). The questionnaire was used as a main tool for selected sample. Answers analyzed by using the statistical program (SPSS) to calculate the arithmetic mean, standard deviation, weight percentage, correlation, F test, and Squared factor (R2).
The research derived its importance from the distinguished role of information systems in the work of industrial companies, and its impact toward achieving economic growth rates in its various activities. T
... Show MoreToxoplasma gondii has a worldwide distribution and it is one of the most prevalent infectious agents in Iraq. The study was conducted on 200 serum samples of unmarried female university of students age ranged between 18 to 26 years to detect Toxoplasma gondii antibodies. The aim of this study was to detect T. gondii antibodies among unmarried female students in Iraqi universities using different serological tests. Seventy six (38%) serum samples out of 200 subjects were positive for toxoplasma antibodies by Latex agglutination test (LAT). Among 76 LAT sera positive ,only 58 (29%) serum samples were positive with toxoplasma IgG ELISA test , however , the results of IgM ELISA assay were positive only for 3 (1.5%) unmarried
... Show MoreNeural cryptography deals with the problem of “key exchange” between two neural networks by using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between two communicating parties ar eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process.