Preferred Language
Articles
/
hRaKXIoBVTCNdQwCfpwq
E-learning applications and their significance among students of the Department of Chemistry in the Faculty of Education for Pure Sciences – Ibn Al-Haytham
...Show More Authors

--The objective of the current research is to identify: 1) Preparing a scale level for e-learning applications, 2) What is the relationship between the applications of e-learning and the students of the Department of Chemistry at the Faculty of Education for Pure Sciences/ Ibn Al-Haytham – University of Baghdad. To achieve the research objectives, the researcher used the descriptive approach because of its suitability to the nature of the study objectives. The researcher built a scale for e-learning applications that consists of (40) items on the five-point Likrat scale (I agree, strongly agree, neutral, disagree, strongly disagree). He also adopted the scale of scientific values, and it consists of (40) items on a five-point scale as well. The sample consisted of (200) male and female students from the Department of Chemistry at the Faculty of Education for Pure Sciences/ Ibn Al-Haytham - Phase Four – Morning Study. The psychometric properties of the instruments were verified from face and structure validity and Reliability in a manner of internal consistency, and the researcher used the following statistical means: (T-test of one sample, T-test of two independent samples, Chi-squared test, Pearson correlation coefficient, equation of Cronbach’s alpha). The researcher reached the following results: 1) The large number of students of the Department of Chemistry at the Faculty of Education for Pure Sciences/ Ibn Al-Haytham who are using e-learning applications, 2) There is a strong correlation and direct relationship between the applications of e-learning and the students of the Chemistry Department. The significance of e-learning applications, their relationship and their significant and effective role in the development of these important applications has been discussed in this research among the students of the Department of Chemistry at the Faculty of Education for Pure Sciences – Ibn Al-Haytham

Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 28 2019
Journal Name
Political Sciences Journal
American Presidential Elections- Mechanism and campaign Issues with special reference to 2008-2012 elections
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 05 2017
Journal Name
Baghdad Science Journal
Cache Coherence Protocol Design and Simulation Using IES (Invalid Exclusive read/write Shared) State
...Show More Authors

To improve the efficiency of a processor in recent multiprocessor systems to deal with data, cache memories are used to access data instead of main memory which reduces the latency of delay time. In such systems, when installing different caches in different processors in shared memory architecture, the difficulties appear when there is a need to maintain consistency between the cache memories of different processors. So, cache coherency protocol is very important in such kinds of system. MSI, MESI, MOSI, MOESI, etc. are the famous protocols to solve cache coherency problem. We have proposed in this research integrating two states of MESI's cache coherence protocol which are Exclusive and Modified, which responds to a request from reading

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Apr 11 2024
Journal Name
Russian Journal Of Infection And Immunity
MATRIX METALLOPROTEINASES -3 (MMP-3) SERUM LEVEL AND GENETIC POLYMORPHISMS ASSOCIATED WITH RHEUMATOID ARTHRITIS
...Show More Authors

Abstract Introduction: MMP3 plays a crucial role in the process of bone erosion in the pathomechanism of rheumatoid arthritis (RA). It acts by removing the outer osteoid layer, which allows the osteoclasts to tightly connect and carry out the subsequent damage to the underlying bone. MMP3 can trigger the production of other MMPs like MMP-1, MMP-7, and MMP-9, it plays a pivotal role in the remodeling of connective tissues. Aim of the study: to assess the influence of MMP-3 serum levels and single-nucleotide polymorphisms of rs679620 in the rheumatoid arthritis patients' group in comparison to the control group. Subjects: eighty eight samples, 45 rheumatoid arthritis patients after being referred by their treating physician for regular RA

... Show More
View Publication
Publication Date
Tue Jun 01 2021
Journal Name
Bulletin Of Electrical Engineering And Informatics
A new pseudorandom bits generator based on a 2D-chaotic system and diffusion property
...Show More Authors

A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist

... Show More
View Publication
Scopus (12)
Crossref (6)
Scopus Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Ecological Engineering
Chlorpyrifos Removal from Aqueous Solutions by Emulsion Liquid Membrane – Stability, Extraction, and Stripping Studies
...Show More Authors

Crossref (2)
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Breast Cancer MRI Classification Based on Fractional Entropy Image Enhancement and Deep Feature Extraction
...Show More Authors

Disease diagnosis with computer-aided methods has been extensively studied and applied in diagnosing and monitoring of several chronic diseases. Early detection and risk assessment of breast diseases based on clinical data is helpful for doctors to make early diagnosis and monitor the disease progression. The purpose of this study is to exploit the Convolutional Neural Network (CNN) in discriminating breast MRI scans into pathological and healthy. In this study, a fully automated and efficient deep features extraction algorithm that exploits the spatial information obtained from both T2W-TSE and STIR MRI sequences to discriminate between pathological and healthy breast MRI scans. The breast MRI scans are preprocessed prior to the feature

... Show More
View Publication Preview PDF
Scopus (21)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Iraqi Journal Of Science
Involutive Gamma Derivations on n-Gamma Lie Algebra and 3- Pre Gamma -Lie Algebra
...Show More Authors

     In this paper, the structure of  and  have  been introduced and studied. We also obtain that a is  of a  if and only if there exists an  on such that . In addition, we obtain  that  of if and only if there is an   on  such that  , where  are subspaces of  with eigenvalues 1 and  −1, respectively. We also find  t that the existence of  on  implies that there exists a compatible  under appropriate condition.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Apr 06 2024
Journal Name
Al- Anbar Medical Journal
Metastatic Ovarian Tumor from Incidental Renal Cell Carcinoma: A Case Report and Literature Review
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Image encryption based on combined between linear feedback shift registers and 3D chaotic maps
...Show More Authors

Protecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref