The research aims to identify the relationship between spatial ability and the physical structure of concepts to the students of the Faculty of Education for Pure Sciences / Ibn al-Haitham، research involved students from the third class / morning study for the year 2011/2012 totaling (98) male and female students ،distributed into three groups which were selected randomly . The number of students (26 males and females) represented research sample after excluding repeaters and absentees، the research included two tests ; one test of spatial ability، which included (20) items and other test the physical structure of concepts، which included (12) items distributed into four domains ، the first (linking between concepts) included (4) items and second (putting concepts on the map) included (3) items and the third (complete the map) included (3) items and the fourth (building the structure of the map) included (2) items ، were built on according to the approved controls and after applied to a sample of the research and using appropriate statistical methods show that the level of spatial ability of students high and statistically significant، while the level of the physical structure of concepts acceptable and non-statistically significant also show that the relationship is negative and very weak between the variables of the research.
Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreThe present study involves experimental analysis of the modified Closed Wet Cooling Tower (CWCT) based on first and second law of thermodynamics, to gain a deeper knowledge in this important field of engineering in Iraq. For this purpose, a prototype of CWCT optimized by added packing under a heat exchanger was designed, manufactured and tested for cooling capacity of 9 kW. Experiments are conducted to explore the effects of various operational and conformational parameters on the towers thermal performance. In the test section, spray water temperature and both dry bulb temperature and relative humidity of air measured at intermediate points of the heat exchanger and packing. Exergy of water and air were calculated by applying the exergy
... Show MoreThis paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can
... Show MoreObjective: To investigate the relation between dyslipidemia and insulin resistance where it is one of the metabolic
disorders in patients with type-ΙΙ diabetes mellitus and compare the results with the control group.
Methodology: Blood samples were collected from (35) patients with type-ΙΙ diabetes mellitus, besides (35) healthy
individuals as a control group were enrolled in this study. The age of all subjects range from (20-50). Serum was
used in determination of glucose, insulin, lipid profile (cholesterol (Ch), triglyceride (TG), high-density lipoprotein
(HDL-Ch), low-density lipoprotein (LDL-Ch) and very low-density lipoprotein (VLDL), for patients and control
groups. Insulin resistance (IR) was calculated acco
Background: Background: Helicobacter pylori is an important gastrointestinal bacteria related to the development of superficial atrophic gastritis, peptic ulcer and gastric cancer. Human leukocyte antigens (HLA) may play an important roles in host immune responses to H pylori antigens.
Aim of the study: to investigate the association between HLA-DRB1 genotypes and superficial gastritis with H. pylori infection in an Iraqi patients.
Patients and methods: Sixty patients with superficial gastritis and 100 individuals with apparently normal results after endoscopic examination were recruited from Al-Kindy Teaching Hospital - G
... Show MoreCopper is a cheaper alternative to various noble metals with a range of potential applications in the field of nanoscience and nanotechnology. However, copper nanoparticles have major limitations, which include rapid oxidation on exposure to air. Therefore, alternative pathways have been developed to synthesize metal nanoparticles in the presence of polymers and surfactants as stabilizers, and to form coatings on the surface of nanoparticles. These surfactants and polymeric ligands are made from petrochemicals which are non- renewable. As fossil resources are limited, finding renewable and biodegradable alternative is promising.The study aimed at preparing, characterizing and evaluating the antibacterial properties of copper nanoparticle
... Show MoreThis study employs wavelet transforms to address the issue of boundary effects. Additionally, it utilizes probit transform techniques, which are based on probit functions, to estimate the copula density function. This estimation is dependent on the empirical distribution function of the variables. The density is estimated within a transformed domain. Recent research indicates that the early implementations of this strategy may have been more efficient. Nevertheless, in this work, we implemented two novel methodologies utilizing probit transform and wavelet transform. We then proceeded to evaluate and contrast these methodologies using three specific criteria: root mean square error (RMSE), Akaike information criterion (AIC), and log
... Show MoreThe main purpose of this work is to introduce some types of fuzzy convergence sequences of operators defined on a standard fuzzy normed space (SFN-spaces) and investigate some properties and relationships between these concepts. Firstly, the definition of weak fuzzy convergence sequence in terms of fuzzy bounded linear functional is given. Then the notions of weakly and strongly fuzzy convergence sequences of operators are introduced and essential theorems related to these concepts are proved. In particular, if ( ) is a strongly fuzzy convergent sequence with a limit where linear operator from complete standard fuzzy normed space into a standard fuzzy normed space then belongs to the set of all fuzzy bounded linear operators
Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou
... Show More