Preferred Language
Articles
/
jRe4-pABVTCNdQwC45Ef
The Relationship Between Spatial Ability And The Physical Structure of concepts to The Students of The College of Education for Pure
...Show More Authors

          The research aims to identify the relationship between spatial ability  and the physical structure of concepts to the students of the Faculty of Education for Pure Sciences / Ibn al-Haitham، research involved students from the third class / morning study for the year 2011/2012  totaling (98) male and female students ،distributed into three groups which were selected randomly . The number of students (26 males and females)  represented research sample after excluding repeaters and absentees، the research included two tests ; one test of spatial ability، which included (20) items and other test the physical structure of concepts، which included (12) items distributed into four domains ، the first (linking between concepts) included (4) items and second (putting concepts on the map) included (3) items and the third (complete the map) included (3) items and the fourth (building the structure of the  map) included (2) items ، were built on according to the approved controls and after applied to a sample of the research and using appropriate statistical methods show that the level of spatial ability of students high and statistically significant، while the level of the physical structure of concepts acceptable and non-statistically significant also show that the relationship is negative and very weak between the variables of the research.

Crossref
View Publication
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Energy and Exergy Analysis on Modified Closed Wet Cooling Tower in Iraq
...Show More Authors

The present study involves experimental analysis of the modified Closed Wet Cooling Tower (CWCT) based on first and second law of thermodynamics, to gain a deeper knowledge in this important field of engineering in Iraq. For this purpose, a prototype of CWCT optimized by added packing under a heat exchanger was designed, manufactured and tested for cooling capacity of 9 kW. Experiments are conducted to explore the effects of various operational and conformational parameters on the towers thermal performance. In the test section, spray water temperature and both dry bulb temperature and relative humidity of air measured at intermediate points of the heat exchanger and packing. Exergy of water and air were calculated by applying the exergy

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Multi-Stage Hydraulic Fracturing Completion Design Based on Ball-and-Sleeve Method
...Show More Authors

This paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 06 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Lipid Profile and Insulin Resistance in Patients with Type-ΙΙ Diabetes Mellitus
...Show More Authors

Objective: To investigate the relation between dyslipidemia and insulin resistance where it is one of the metabolic
disorders in patients with type-ΙΙ diabetes mellitus and compare the results with the control group.
Methodology: Blood samples were collected from (35) patients with type-ΙΙ diabetes mellitus, besides (35) healthy
individuals as a control group were enrolled in this study. The age of all subjects range from (20-50). Serum was
used in determination of glucose, insulin, lipid profile (cholesterol (Ch), triglyceride (TG), high-density lipoprotein
(HDL-Ch), low-density lipoprotein (LDL-Ch) and very low-density lipoprotein (VLDL), for patients and control
groups. Insulin resistance (IR) was calculated acco

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 06 2014
Journal Name
Plos One
Hepatic Carboxylesterase 1 Is Induced by Glucose and Regulates Postprandial Glucose Levels
...Show More Authors

View Publication
Scopus (34)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Thu Apr 18 2019
Journal Name
Al-kindy College Medical Journal
HLA-DRB1*03 And DRB1*15 Frequency In Helicobacter Pylori Superficial Gastritis
...Show More Authors

Background: Background: Helicobacter pylori is an important gastrointestinal bacteria related to the development of  superficial atrophic gastritis, peptic ulcer and gastric cancer. Human leukocyte antigens (HLA) may play an important roles in host immune responses to H pylori antigens.

Aim of the study: to investigate the association between HLA-DRB1 genotypes and superficial gastritis with H. pylori infection in an Iraqi patients.

Patients and methods: Sixty patients with superficial gastritis and 100 individuals with apparently normal results after endoscopic examination were recruited from Al-Kindy Teaching Hospital - G

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
Copper Nanoparticles Synthesized in Biopolymer Matrix and Their Application in Antibacterial Activity
...Show More Authors

Copper is a cheaper alternative to various noble metals with a range of potential applications in the field of nanoscience and nanotechnology. However, copper nanoparticles have major limitations, which include rapid oxidation on exposure to air. Therefore, alternative pathways have been developed to synthesize metal nanoparticles in the presence of polymers and surfactants as stabilizers, and to form coatings on the surface of nanoparticles. These surfactants and polymeric ligands are made from petrochemicals which are non- renewable. As fossil resources are limited, finding renewable and biodegradable alternative is promising.The study aimed at preparing, characterizing and evaluating the antibacterial properties of copper nanoparticle

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Fri Mar 15 2024
Journal Name
Iraqi Statisticians Journal
Estimate a nonparametric copula density function based on probit and wavelet transforms
...Show More Authors

This study employs wavelet transforms to address the issue of boundary effects. Additionally, it utilizes probit transform techniques, which are based on probit functions, to estimate the copula density function. This estimation is dependent on the empirical distribution function of the variables. The density is estimated within a transformed domain. Recent research indicates that the early implementations of this strategy may have been more efficient. Nevertheless, in this work, we implemented two novel methodologies utilizing probit transform and wavelet transform. We then proceeded to evaluate and contrast these methodologies using three specific criteria: root mean square error (RMSE), Akaike information criterion (AIC), and log

... Show More
View Publication
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Fuzzy Convergence Sequence and Fuzzy Compact Operators on Standard Fuzzy Normed Spaces
...Show More Authors

The main purpose of this work is to introduce some types of fuzzy convergence sequences of operators defined on a standard fuzzy normed space (SFN-spaces) and investigate some properties and relationships between these concepts. Firstly, the definition of weak fuzzy convergence sequence in terms of fuzzy bounded linear functional is given. Then the notions of weakly and strongly fuzzy convergence sequences of operators  are introduced and essential theorems related to these concepts are proved. In particular, if ( ) is a strongly fuzzy convergent sequence with a limit  where linear operator from complete standard fuzzy normed space  into a standard fuzzy normed space  then  belongs to the set of all fuzzy bounded linear operators

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu May 30 2024
Journal Name
Iraqi Journal Of Science
A Review Study on Forgery and Tamper Detection Techniques in Digital Images
...Show More Authors

Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou

... Show More
View Publication
Scopus Crossref