The current research aims at detecting Brain Dominance Learning Styles distinguished
and ordinary secondary school students (males and females).The researcher adopted Torrance
measure, known as ‘the style of your learning and thinking to measure Brain Dominance
Learning Styles’, the codified version of Joseph Qitami (1986); picture (a). The researcher
verified the standard properties of tool. The final application sample was 352 distinguished
and ordinary students; 176 distinguished male and female students and 176 ordinary male and
female students at the scientific fifth level of secondary school from schools in the province of
Baghdad, AL- KarKh Education Directorates in the First and Second . and who have been
selected in a stratified random sampling . After the application the tool of research and
analysis of the data statistically by using statistical methods ( Chi- Square, ,Guttman
Correlation), the Researcher arrived at the following results:
1.The right learning style is the dominant brain style among Individuals the research sample
Applied .
2.The presence of statistically significant differences in the right Brain Dominance Learning
Style among the sample Individuals at distinguished and ordinary in favor of distinguished
students .
3. The lack of statistically significant differences in the Brain Dominance Learning Styles can
be attributed to the sex variable.
This research aims to removes dyes from waste water by adsorption using banana peels. The conduct experiment done by banana powder and banana gel to compare between them and find out which one is the most efficient in adsorption. Studying the effects different factors on adsorption material and calculate the best removal efficiency to get rid of the methylene blue dye (MB).
This paper aims to find new analytical closed-forms to the solutions of the nonhomogeneous functional differential equations of the nth order with finite and constants delays and various initial delay conditions in terms of elementary functions using Laplace transform method. As well as, the definition of dynamical systems for ordinary differential equations is used to introduce the definition of dynamical systems for delay differential equations which contain multiple delays with a discussion of their dynamical properties: The exponential stability and strong stability
Photos of the backwardness of the Muslims and their backwardness in creating
sustainable development policies have driven them to a state of civilization , which witnesses
Avckaddoha time ago and not disrupt the adversary is a phenomenon thought the youth to
exercise its role and duty in the construction and development of the state witnesses Mdanah
civilized nation.
The vigilance thought the youth of its slumber correct form could provide opportunities for
growth and development in the Arab and Islamic worlds, and both material and moral support
through the creation model youth Islamic social role models, but that the image of the model
, , - 1
The main function of a power system is to supply the customer load demands as economically as possible. Risk criterion is the probability of not meeting the load. This paper presents a methodology to assess probabilistic risk criteria of Al-Qudus plant before and after expansion; as this plant consists of ten generating units presently and the Ministry Of Electricity (MOE) is intending to compact four units to it in order to improve the performance of Iraqi power system especially at Baghdad region. The assessment is calculated by a program using Matlab programming language; version 7.6. Results show that the planned risk is (0.003095) that is (35 times) less than that in the present plant risk; (0.1091); which represents respectable imp
... Show MoreVehicular Ad Hoc Networks (VANETs) are integral to Intelligent Transportation Systems (ITS), enabling real-time communication between vehicles and infrastructure to enhance traffic flow, road safety, and passenger experience. However, the open and dynamic nature of VANETs presents significant privacy and security challenges, including data eavesdropping, message manipulation, and unauthorized access. This study addresses these concerns by leveraging advancements in Fog Computing (FC), which offers lowlatency, distributed data processing near-end devices to enhance the resilience and security of VANET communications. The paper comprehensively analyzes the security frameworks for fog-enabled VANETs, introducing a novel taxonomy that c
... Show More