The current research aims to identify the level of mental alertness among students of the Department of Chemistry in the Faculty of Education for Pure Sciences – Ibn Al-Haytham during the academic year (2022-2023). To achieve this goal, a descriptive approach was followed. The research community was identified as all chemistry students across the four grades (first, second, third, and fourth). A sample from each grade was selected for the current research. A tool was prepared to measure mental alertness within the research sample. The researcher adopted the scale by Baer, Smith, Kristemoyer, & Tany (2006), which was developed by Al-Buhairi et al. (2014), ensuring its validity, reliability, and psychometric characteristics, making it ready for application. When the tool was applied in the second semester of the mentioned year, data were statistically analyzed using some statistical methods (SPSS23). It was
Blogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.
Obstacle avoidance is one of the major tasks needed to be carefully focused by the autonomous system designers. In this digital era, most industries are moving towards autonomous systems. Obstacle avoidance is considered as a primary concern for any autonomous system. In this paper, a prototype of an autonomous vehicle is presented, which is capable of obstacle avoidance using an ultrasonic sensor for its movement and avoidance. An Arduino microcontroller is used to achieve the desired operation. In order to achieve the desired task of the proposed system, a proper methodology is followed which combines appropriate selection of hardware components as well as logic design of actions for obstacle avoidance. The proposed system can
... Show MoreIn this work, a step-index fiber with core index and cladding index has been designed. Single-mode operation can be obtained by using a fiber with core diameters 4–13 µm operating at a wavelength of 1.31 µm and by 4–15 µm at 1.55 µm. The fundamental fiber mode properties such as phase constant, effective refractive index, mode radius, effective mode area and the power in the core were calculated. Distributions of the intensity and the amplitude were shown.
In this work chemical vapor deposition method (CVD) for the production of carbon nanotubes (CNTs) have been improved by the addition of S. Steel mesh container (SSMC) inside which the catalyst (Fe/Al2O3) was placed. Scanning electron microscopy (SEM) investigation method used to study nanotubes produced, showed that high yield of two types of (CNTs) obtained, single wall carbon nanotube (SWCNTs) with diameter and length of less than 50nm and several micrometers respectively and nanocoil tubes with a diameter and length of less than 100nm and several micrometers respectively. The chemical analysis of (CNTs) reveals that the main component is carbon (94%) and a little amount of Al (0.32%), Fe (2.22%) the reminder is oxygen. It was also fou
... Show MoreIn this work the structural, optical and sensitive properties of Cerium - Copper oxide thin film prepared on silicon and glass substrate by the spray pyrolysis technique at a temperature of (200, 250, 300 °C). The results of (XRD) showed that all the prepared films were of a polycrystalline installation and monoclinic crystal structure with a preferable directions was (111) of CuO. Optical characteristics observed that the absorption coefficient has values for all the prepared CuO: Ce% (104 cm-1) in the visible spectrum, indicating that all the thin films prepared have a direct energy gap. Been fabrication of gas sensors of (CuO: Ce %) within optimum preparation conditions and study sensitivity properties were examined her exposed to ni
... Show MoreIntroduction: Breast cancer is a significant global health concern, affecting millions of women worldwide. While advancements in diagnosis and treatment have improved survival rates, the impact of this disease extends beyond physical health. It also significantly influences a woman's lifestyle and overall well-being. Objectives: The current study intends to analyze the lifestyle of breast cancer patients who are receiving therapy or are being followed up at the Oncology Teaching Hospital in Medical City, Baghdad, Iraq. Method: The present study uses a descriptive design with an application of an evaluation approach. A convenience sample of 100 women with breast cancer was selected from the Teaching Oncology Hospital at the Medical C
... Show MoreLet be an infinite dimensional separable complex Hilbert space and let , where is the Banach algebra of all bounded linear operators on . In this paper we prove the following results. If is a operator, then 1. is a hypercyclic operator if and only if D and for every hyperinvariant subspace of . 2. If is a pure, then is a countably hypercyclic operator if and only if and for every hyperinvariant subspace of . 3. has a bounded set with dense orbit if and only if for every hyperinvariant subspace of , .
Assume that is a meromorphic fuction of degree n where X is compact Riemann surface of genus g. The meromorphic function gives a branched cover of the compact Riemann surface X. Classes of such covers are in one to one correspondence with conjugacy classes of r-tuples ( of permutations in the symmetric group , in which and s generate a transitive subgroup G of This work is a contribution to the classification of all primitive groups of degree 7, where X is of genus one.
The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show More