Preferred Language
Articles
/
jcoeduw-142
The exact location and its relation to cognitive method (risk-caution) of University students
...Show More Authors

The present study aimed to identify the exact location and its relation to cognitive
method (risk_caution) to university students. The sample consisted of (300) students who
were chosen randomly and equally. The study results indicated that students possess an
internal exact location and they also use risk cognitive method. The study also indicated that
there is a prophesies which is an exact location for others to reach to caution cognitive
method. Depending on these results, the study recommended to benefit from the results of the
study variables and from the measurement of the exact location and method of cognitive
(risk_caution) to identify male and female students and especially by consulting units at
colleges to steer those with caution cognitive method in adapting to environmental changes,
especially at college, through the development of programs to promote effective behavior.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Al-kindy College Medical Journal
Estimation of Salivary IL-6 Level in relation of Periodontal Status in Patients with Hyperthyroidism
...Show More Authors

Background: The overproduction of thyroid hormones is known as hyperthyroidism. Increased susceptibility to caries and periodontal disease are two potential oral symptoms. The interleukin-6 (IL-6) was observed to significantly increased in the hyperthyroid group. According to multiple research, IL-6 dysregulation has been linked to a number of oral disorders, including periodontal diseases. The study aimed to evaluate periodontal health status in relation to IL6 among hyperthyroidism patients.

Subjects and Methods: The sample was composed of 90 female patients aged 25-45 years attending endocrine disorder

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (4)
Scopus Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
The Foreignized Translation: One Approach to Respect and Preserve the Culture of the other
...Show More Authors

Domesticated translation has been for a long time the norm in cultural communication between nations all over the world. The texts are translated mainly into English (being the dominant language) in terms dictated principally by the requirements of the target language (English). The claim has been that fluency, readability, and immediate intelligibility can be guaranteed as far as the reader of the target language is concerned (English). The foreignness of the text (of the culture which produced it) would be not preserved. Not only this. Being the language of predominant cultures, English has become number one among languages into which texts are translated. The imbalance has been noticeable between the volumes of works translated from a

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Investigation of the association of AGTR1 A1166C rs5186 and FTO rs9939609 polymorphisms with the obesity in children and adolescents
...Show More Authors

Obesity is a risk factor for a number of chronic conditions. Obesity is clinically defined using the body mass index (BMI) as weight in kg divided by (height)2 in m2 correlated with obesity. Currently, genetic markers of obesity are being studied. This study focused on the association between the angiotensin II receptor AGTR1 gene (A1166C) and fat mass and obesity-associated protein also known as alpha-ketoglutarate-dependent dioxygenase (FTO) (rs9939609) in obese children and adolescents patients in Rostov region, Russia.  Five-hundreds of Russian nationality child and adolescent were recruited for the obesity-control studies. The relationship between the A1166C polymorphism of the AGTR1 gene in

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
ON NAIVE TAYLOR MODEL INTEGRATION METHOD
...Show More Authors

Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 01 2014
Journal Name
Proceedings Of Ieee East-west Design & Test Symposium (ewdts 2014)
Qubit method for diagnosing digital systems
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Feb 04 2016
Journal Name
Journal Of The College Of Basic Education
Punch Holes, Invented Steganography Method Researchers
...Show More Authors

A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c

... Show More
Publication Date
Sat Nov 01 2014
Journal Name
I-manager's Journal On Information Technology
AN ENHANCED METHOD FOR SPRITE EXTRACTING
...Show More Authors

The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.

Publication Date
Sun Jul 02 2017
Journal Name
Journal Of Educational And Psychological Researches
(The impact of strategy warhead numbered in the collection of second grad students At the medium in history)
...Show More Authors

The current research aims to identify the " impact of strategic warheads numbered ( NHT) in the collection average second grade students in the article of history). " To achieve this, I assumed the researcher that there is no different between the statistically significant the average score for the collection of experimental group who teaches the Arab Islamic history on and a strategic warheads numbered and the average score for the collection of the control group who were studying the same article according to the classic method ( traditional) . The study sample consisted of 64 students from the second grade average in the secondary warka bin nawfal in the general Directorate for education first karkh in Baghdad for the annual cources 2

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 01 2025
Journal Name
مجلة كلية التربية الاساسية
The Effect of the inquiry wheel model on the chemical enlightenment of Second- Year intermediate School female Students
...Show More Authors

The aim of the research was to know the effect of the inquiry wheel model on chemical enlightenment among second-grade middle school female students in government daytime middle and secondary schools. Umm AlQura Middle School was chosen by intentional selection to be its students as the research sample for the academic year (2024-2025). Two groups were chosen, one of which was the experimental group studying using the inquiry wheel model and the other the control group studying in the usual way. The equivalence of the two research groups was verified by a set of variables, which were (chronological age in months, previous information test, Raven's intelligence test, chemical enlightenment scale). As for the research tool, the researchers bu

... Show More
Preview PDF