The primary objective of this study is to examine the effects of a do-it-yourself (DIY) technique on the reading comprehension performance of fifth-grade students in preparatory schools. In order to accomplish the objective of this research, it is posited that a null hypothesis can be established, suggesting that there are no statistically significant disparities between the average scores of the experimental group, which is instructed using a do-it-yourself (DIY) strategy, and the control groups, which are instructed using a prescribed method, in terms of their reading comprehension attainment. Developing a pre- and post-achievement test. Both groups have been equalized in terms of characteristics such as parental educational level, English achievement scores in the previous academic year, and the pre-test scores of both groups. A set of five questions has been prepared to provide a post-test. The Alpha-Cronbach method was employed to validate the reliability coefficient. The discriminatory power and level of difficulty for each item have been ascertained through statistical analysis of the items. As a consequence, the complete sample has been subjected to the post-test. The data collected from the post-test results has been subjected to statistical analysis using the formula for the T-test of two independent samples. Based on the findings, a statistically significant disparity is observed in the mean scores between the experimental group, which received instruction using the DIY strategy, and the control group, which received instruction through the traditional manner. The study's findings and conclusions have led to the formulation of relevant recommendations and proposals for future research endeavors.
The purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management
... Show MoreOne of the most common metabolic illnesses in the world is diabetes mellitus. This metabolic disease is responsible for a large percentage of the burden of kidney damage and dysfunction. The goal of this study was to look into the renal function of diabetic patients using metformin monotherapy who came to Mosul's Al-Wafaa diabetes care and research facility. During the period 1 January 2021 to 30 April 2021, 47 patients with T2DM (age 50.48 7.74 years) were enrolled in this case-control study. These patients' results were compared to a control group of 47 seemingly healthy people (age 45.89 9.06 years). All participants' demographic and medical histories were acquired through the delivery of a questionnaire. Blood samples were collected
... Show MoreTotal Quality Assurance Concept have appeared in Higher Education Institutions as a result of the continuous criticism for the lower quality of the outputs of these institutions and their inappropriacy to the needs of the job market. The faculty, i.e. teaching staff member, is one of the most important output for his/her responsibility to achieve the stated goals in higher education. This represents a problem that may influence the construction of society which has to limit his tasks, responsibilities, and competencies that should be found in a faculty, and evaluating his teaching profession in light of the prerequisites of the century to become an input to achieve quality assurance in Higher Education. Therefore, the present study aims
... Show More The study (Quality in the Industrial Products Designs and its Reflection on Achieving Competitive Advantage) focused on developing the products in a way that satisfies human desires through the impact of technology on products design systems and performance enhancement. The study question is: how to effectively achieve quality in industrial products designs that influences competitiveness? The aim of the research is to show the design contexts for the product and its reflection on competitiveness. The study is limited to (LG) products in 2017-2018. The results and conclusions reached at by the researcher are included in the study.
The sample models adopted contexts, forms and relational relations transcending traditional contex
Objective: The goal of this research was to evaluate where selenium nanoparticles impact the activity of antibodies in immunized lambs with foot and mouth vaccines by modulating the immune system. Materials and Methods: Two groups of lambs of 3–4 months of age were injected with 1 ml of ARRIAH-VAC vaccine intramuscularly in the neck, five Lambs were given selenium nanoparticles (size 100 nm) oral administration of selenium nano dose of 0.1 mg/kg of body mass once every day for sixty days considered as group one (G1) while the other five used as control Group 2 (G2). Results: This resulted in the establishment of an immune response, as evidenced by a rise in antibody titer in the blood using the ELISA test for three serotypes A,
... Show MoreThe problem of divorce from the phenomena that characterized the nature of privacy,
although their impact beyond the individual to include the community as a whole, the parties
to the relationship affected by divorce caused them harm moral and material for a long time,
resulting imbalance in the personal relationship and family and social relations because of the
high divorce rates, particularly in Iraq high rates of 28690 thousand cases in 2004 to 59 515
thousand cases in 2011 and an increase of more than (100%) during the period above, and this
rise caused by aggravation of many of the problems led the reasons for social, economic and
incompatibility spouses, health and lack of reproduction, not spending The wife a
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More