The research aims to identify the relationship between spatial ability and the physical structure of concepts to the students of the Faculty of Education for Pure Sciences / Ibn al-Haitham، research involved students from the third class / morning study for the year 2011/2012 totaling (98) male and female students ،distributed into three groups which were selected randomly . The number of students (26 males and females) represented research sample after excluding repeaters and absentees، the research included two tests ; one test of spatial ability، which included (20) items and other test the physical structure of concepts، which included (12) items distributed into four domains ، the first (linking between concepts) included (4) items and second (putting concepts on the map) included (3) items and the third (complete the map) included (3) items and the fourth (building the structure of the map) included (2) items ، were built on according to the approved controls and after applied to a sample of the research and using appropriate statistical methods show that the level of spatial ability of students high and statistically significant، while the level of the physical structure of concepts acceptable and non-statistically significant also show that the relationship is negative and very weak between the variables of the research.
A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreObjective. This study aimed to evaluate the orthodontic bond strength and enamel-preserving ability of a hydroxyapatite nanoparticles-containingself-etch system following exposure to various ageing methods. Materials and Methods. Hydroxyapatite nanoparticles (nHAp) were incorporated into an orthodontic self-etch primer (SEP, Transbond™ plus) in three different concentrations (5%, 7%, and 9% wt) and tested versus the plain SEP (control) for shear bond strength (SBS), adhesive remnant index (ARI) scores, and enamel damage in range-finding experiments using premolar teeth. The best-performing formulation was further exposed to the following four artificial ageing methods: initial debonding, 24 h water storage, one-month water stora
... Show MoreThe present study aimed to determine the serum sex hormone levels among Benign Prostatic Hyperplasia (BPH) patients before and after 3 months of oral administration of 5-α reductase inhibitor(finasteride). Forty BPH patients and 40 healthy men from Amara city were involved in this study, their ages were between 40-59 year. They were all subjected to direct estimation of hormones by MinVidas method including Testosterone (T), Estradiol (E2), Follicle Stimulating Hormone (FSH), Luteinizing Hormone (LH), Prolactin (PRL), and Dihydrotestosterone (DHT) before and after 3 months of treatment with 5α-reductase inhibitor (finasteride) (the healthy individuals didn’t take finasteride).The results showed that T level was significantly lo
... Show MoreThe purpose of this subject is to identify what is being studied in the article, which is the involvement of human Metapneumovirus in children with respiratory illnesses. During the period November 2020 to February 2021, 100 patients with respiratory tract infections were admitted to Al Zahra Teaching Hospital and AL-Forat AL-Awsat Teaching Hospital in Najaf Governorate. Nasopharyngeal swabs were collected from patients for molecular diagnosis of human metapneumovirus using Real-Time-PCR. The patients were distributed based on age into five groups as follows (Less than one, 1-2, 2-3, 3-4, and 4-5 years), and twenty samples of healthy individuals were approved as a control group without any clinical signs of infection. the children of age gr
... Show MoreBACKGROUND: The rapidly growing knowledge regarding factors controlling tumour growth, with the new modalities of therapy acting on the biological activity of the tumours draw the attention of most cancer researches nowadays and represent a major focus for clinical oncology practice. For the detection of HER2/neu protein overexpression and gene amplification, immunohistochemistry (IHC) and in-situ hybridisation (ISH) is the recommended techniques, respectively, with high concordance between the two techniques. The current United Kingdom recommendations for HER2/neu testing are either for a two-tier system using IHC with reflex ISH testing in equivocal positive cases, or a one-tier ISH strategy. AIM: To compare the results of HER2/neu gene s
... Show MoreAssessing water quality provides a scientific foundation for the development and management of water resources. The objective of the research is to evaluate the impact treated effluent from North Rustumiyia wastewater treatment plant (WWTP) on the quality of Diyala river. The model of the artificial neural network (ANN) and factor analysis (FA) based on Nemerow pollution index (NPI). To define important water quality parameters for North Al-Rustumiyia for the line(F2), the Nemerow Pollution Index was introduced. The most important parameters of assessment of water variation quality of wastewater were the parameter used in the model: biochemical oxygen demand (BOD), chemical oxygen dem