Preferred Language
Articles
/
jRe4-pABVTCNdQwC45Ef
The Relationship Between Spatial Ability And The Physical Structure of concepts to The Students of The College of Education for Pure
...Show More Authors

          The research aims to identify the relationship between spatial ability  and the physical structure of concepts to the students of the Faculty of Education for Pure Sciences / Ibn al-Haitham، research involved students from the third class / morning study for the year 2011/2012  totaling (98) male and female students ،distributed into three groups which were selected randomly . The number of students (26 males and females)  represented research sample after excluding repeaters and absentees، the research included two tests ; one test of spatial ability، which included (20) items and other test the physical structure of concepts، which included (12) items distributed into four domains ، the first (linking between concepts) included (4) items and second (putting concepts on the map) included (3) items and the third (complete the map) included (3) items and the fourth (building the structure of the  map) included (2) items ، were built on according to the approved controls and after applied to a sample of the research and using appropriate statistical methods show that the level of spatial ability of students high and statistically significant، while the level of the physical structure of concepts acceptable and non-statistically significant also show that the relationship is negative and very weak between the variables of the research.

Crossref
View Publication
Publication Date
Mon Nov 01 2021
Journal Name
Energy Reports
Global solar radiation prediction over North Dakota using air temperature: Development of novel hybrid intelligence model
...Show More Authors

View Publication
Scopus (78)
Crossref (80)
Scopus Clarivate Crossref
Publication Date
Tue Oct 11 2022
Journal Name
Al–bahith Al–a'alami
Comment moderation strategies in Canadian news media and their principles
...Show More Authors

This paper offers a critical examination of Canadian news guidelines and policies
on user-generated content (UGC) posted on news-related comment sections and
social media.
The outline of how news-related UGC is moderated within Canadian news is achieved
by looking at the online comment policies of major Canadian news organizations like .
the CBC, CityNews (Halifax), CTV News, Glacier Media, Global News, The Globe
and Mail, Narcity Media, Postmedia, QUB (Québecor), and Torstar.The policies highlight how Canadian news organizations have practical strategies
to manage news-related UGC but also call upon positive and negative social
principles, to flag ill practices, foster democracy, and fight against online hate sp

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Oct 02 2024
Journal Name
Translation&linguistics
Verbal forms in French and Iraqi Arabic: a contrastive study
...Show More Authors

View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
International Conference Of Numerical Analysis And Applied Mathematics Icnaam 2019
Isolation and characterization study towards microbial improved oil recovery applications
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Mon Feb 19 2018
Journal Name
Al-academy
Balanced performance and structural mechanisms in industrial product design systems
...Show More Authors

The research focused on (balanced performance and structural mechanisms in industrial product design systems) by focusing on product development in a manner that is able to meet the human requirements through the effect of smart technology on the systems of product designs and its effectiveness in achieving the design and functional variables that have an effective effect in User and industrial products, correspond to the requirements of the user life at the level of daily interaction. The first chapter ensures the problem of research is the following question: What are the mechanisms to achieve balanced performance in some systems design to fit with the variables B N User and industrial products? The objective of the research was to ide

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 04 2024
Journal Name
F1000research
Posterior palatal seal recording: fact and reasons among Iraqi dentists
...Show More Authors

Abstract* Backgrounds The retention of the maxillary complete denture may be influenced by adequate recording in the patient’s mouth, marking, and carving of the post-dam on the maxillary cast. Failure to do so may lead to loss of retention. Successful denture construction with patient’s comfort could be achieved by effective methods of recording, marking, and carving of the post-dam. The aim of the study was to assess Iraqi dentists in their knowledge and application of the post-dam in maxillary complete dentures. Methods Questionnaires were distributed randomly through online Google Forms and 118 Iraqi dentists with different academic degree participated in the study. A multinomial logistic regression model was also used to ass

... Show More
View Publication
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Mar 28 2022
Journal Name
The Open Dentistry Journal
Depression, Anxiety and Stress Among Dentists During COVID-19 Lockdown
...Show More Authors
Introduction:

The objective of this study was to investigate the levels of depression, anxiety, and stress among dentists during covid-19 lockdown and to investigate the relationship between stress and each mental health state.

Methods:

A cross-sectional survey on 269 dentists was conducted using DASS-21 and PHQ-9 questionnaires. Bivariate and multivariate models were constructed and the odds ratio (OR) was calculated to assess the strength of the association between an independent categorical variable and the outcome.

Results and Discussion:

Being unsatisfied with the job was as

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Al-Hafizh Abdan al-Ahwazi, 306 And his modern efforts
...Show More Authors

Abadan, one of the modernists, is the critics, whose words depend on the wound, the modification and the ills of the hadeeth.
He lived Abadan, age in the request to talk and take the elders, and Awali, and attribution, which affected him by taking, and update about (300) Sheikh or more.
Abadan also excelled in the novel and its origins, which made students talk to him, and ask for the novel, with his hardness and hardship. As we will see in the folds of the search

View Publication Preview PDF
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More