Preferred Language
Articles
/
cBhQ55QBVTCNdQwCryK8
Main Difficulties Faced by EFL Students in Language Learning
...Show More Authors

Many undergraduate learners at English departments who study English as a foreign language are unable to speak and use language correctly in their post -graduate careers. This problem can be attributed to certain difficulties, which they faced throughout their education years that hinder their endeavors to learn. Therefore, this study aims to discover the main difficulties faced by EFL students in language learning and test the difficulty variable according to gender and college variables then find suitable solutions for enhancing learning. A questionnaire with 15 items and 5 scales were used to help in discovering the difficulties. The questionnaire was distributed to the selected sample of study which consists of 90 (male and female) students selected randomly from the 3rd and 4th year class levels at English departments from colleges of Languages and Education (Ibn-Rushd) at the University of Baghdad. The results of the study showed that EFL students face difficulties in language learning such as the role of society in discouraging English language learning, the learners’ shyness, which prevents them from speaking English in fear of making mistakes, lack of motivation, and the influence of class size and crowdedness. After analyzing the results, some recommendations and suggestions were presented to solve the problem and eliminate difficulties.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 20 2019
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of Heat Exchanger Performance by Using Dimpled Tube
...Show More Authors

The enhancement of heat exchanger performance was investigated using dimpled tubes tested at different Reynolds numbers, in the present work four types of dimpled tubes with a specified configuration manufactured, tested and then compared performance with the smooth tube and other passive techniques performance. Two dimpled arrangements along the tube were investigated, these are inline and staggered at constant pitch ratio X/d=4, the test results showed that Nusselts number (heat transfer) of the staggered array is higher than the inline array by 13%.  The effect of different depths of the dimple (14.5 mm and 18.5 mm) has been also investigated; a tube with large dimple diameter enhanced the Nusselts number by about 25% for the ran

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Aug 01 2017
Journal Name
International Journal Of Scientific & Engineering Research
Integrated System of Information hiding by Applying Three levels
...Show More Authors

MB Mahmood, BN Dhannoon

View Publication
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Wed Dec 15 2010
Journal Name
Iraqi Journal Of Laser
Photodynamic Inactivation of Candida Albicans Sensitized by Malachite Green
...Show More Authors

The aim of this study is to investigate the ability of malachite green (MG) combined with 650nm diode laser to kill Candida albicans and to spectrally study the MG photodegradation after photodynamic therapy (PDT) spectrally. Cultures of Candida albicans were exposed to 40mW, 650 nm diode laser in the absence of MG. In PDT group, the MG was added to the Candida suspension for 5 min then exposed to diode laser for (5, 10, 15, 20) min at power density of 0.59W/cm2. The absorption spectrum of the photosensitized fungal suspension was obtained. The data were submitted to T-test (p<0.05). A 650nm diode laser in the presence of MG reduced the number of CFU/ml in 98.4%. Laser with 650nm alone and MG alone did not reduce significantly the num

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 15 2010
Journal Name
Iraqi Journal Of Laser
Treatment of Oral Conditions by 810 nm Diode Laser
...Show More Authors

When laser light incident on biological tissue, it is either reflected from the
surface of the tissue (e.g. the skin) or scattered inside the tissue or absorbed .The laser light will be
absorbed by water, hemoglobin and melanin. Absorption is also highly dependent on wave-length of
laser radiation. The absorbed light is converted into kinetic energy leading to laser effect that when
appropriately applied can produce reaction ranging from incision, vaporization to coagulation. Aim of
the study: To evaluate the efficiency of diode Laser 810 ± 20nm in treatment of oral lesions. Methods:
6 patients (2 females and 4 males) with different oral lesions were treated in the hospital of specialized
surgeries by the use of dio

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Estimate The Survival Function By Using The Genetic Algorithm
...Show More Authors

  Survival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 31 2019
Journal Name
Iraqi Journal Of Physics
Spectroscopic Diagnostic of Cadmium Sulfide Plasma Produced By LIBS
...Show More Authors

Abstract

       The current study was carried out to reveal the plasma parameters such as ,the electron temperature ( ), electron density (ne) , plasma frequency (fp), Debye length ( ) , Debye number (   for  CdS to employ the LIBS for the purpose of analyzing and determining spectral emission lines using . The results of electron temperature for CdS range (0.746-0.856) eV , the electron density(3.909-4.691)×1018 cm-3. Finally ,we discuss plasma parameters of CdS  through  nano second  laser generated plasma .

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
Separation of oil/water emulsions by microbubble air flotation
...Show More Authors
Abstract<p>Oil/water emulsions are one of the major threats to environment nowadays, occurs at many stages in the production and treatment of crude oil. The oil recovery process adopted will depend on how the oil is present in the water stream. Oil can be found as free oil, as an unstable oil/water emulsion and also as a highly stable oil/water emulsion. The current study was dedicated to the application of microbubble air flotation process for the removal of such oily emulsions for its characters of cost-effective, simple structure, high efficiency and no secondary pollution. The influence of several key parameters on the process removal efficiency was examined, namely, initial oil concentration, pH value of t</p> ... Show More
View Publication
Crossref (17)
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Bioethanol Production by Candida tropicalis Isolated from Sheep Dung
...Show More Authors

 Microorganisms have an active role in biotechnology for example yeasts, especially in some genus like Saccharomyces, Pichia, and CandidaC.tropicalis one of the most important species of Candida and despite it is one of the causative agents of candidiasis but it has a major role in the production of many chemical compounds. C.tropicalis  in the previous study was isolated from sheep dung and morphologically and molecularly classified the result of sequencing was elucidate 100% similarity between the studied isolate and other isolates inserted in DNA Data Bank of Japan DDBJ, physiologically this isolate tolerated 6% ethanol concentration in broth media with the ability to the pro

... Show More
View Publication Preview PDF
Crossref