Continuous conflict between Parisian and Ottoman states the results that Iraq became as
aground for their battles which leads to their own interests in Iraq which are shape their
strategy. The conflict continues for long time. In spite of, they signed many treatments and
protocols between the two sides, as Arzarom treaty , the first and the second, Tahran protocols
, and Astana protocol. This conflict, no sides of them to dose any part of their land, but these
treaties leaded to a big loss to Iraq ,which lost parts of it's land and water area in Ahwaz and
shatt AL-Arab, so, Iraq became as a smoth target for their interests, and lost its
sovereignty,and lost self-govern of the country country . so the research concludes the
following.
Grass trimming operation is widely done in Malaysia for the purpose of maintaining highways. Large number of operators engaged in this work encounters high level of noise generated by back pack type grass trimmer used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known. For predicting the work efficiency deterioration, fuzzy tool has been used in present research. It has been established that a fuzzy computing system will help in identification and analysis of fuzzy models fuzzy system offers a convenient way of representing the relationships between the inputs and outputs of a system in the form of IF-THEN rules. The paper presents
... Show MoreGraphite coated electrodes (GCE) based on molecularly imprinted polymers were fabricated for the selective potentiometric determination of Glibenclamide (Glb). The molecularly imprinted (MIP) and nonimprinted (NIP) polymers were synthesized by radical bulk polymerization using (Glb.) as a template, acrylic acid (AA) and acrylamide (AAm) as monomers, ethylene glycol dimethacrylate (EGDMA) as a cross-linker and benzoyl peroxide (BPO) as an initiator. The imprinted membranes and the non-imprinted membranes were prepared using dioctyl phthalate (DOP) and Dibutylphthalate (DBP) as plasticizers in PVC matrix. The membranes were coated on graphite electrodes. The MIP electrodes using (AA) and (AAm) showed a near nernstian response with slopes o
... Show MoreStudents' passive listening to their teacher's reading is one of main
reasons behindtheir weakness in the reading skill which in its turn may
hinderachieving the in desired objectives.
When exploiting critical thinking, which will lead to deeper
understanding of the intellectual content, in learning and accurate and
correct students' outcomes.
Active listening allows paying attention to the speaker, asking him,
arguing with him, judging what he says, and making decision on what
he says. For this reason, the researcher felt the need for preforming a
study to identify the effect of critical listening on developing students'
critical thinking at reading in the Kurdish language department.
The researcher has
The purpose of this study was to investigate the effect of six thinking hats on creative thinking among 10th grade female students in Tulkarm district. The sample comprises two sections of 10th grade female students (n=80) in Adawiya secondary School, The two sections were divided into two groups; one as an experimental group which works with six thinking hats, and the second as control group that learns traditionally. Creative thinking exam was used to measure the creative thinking with reliability (0.88).
The results of the study have shown the following:
There were statistically significant differences at (α ≤ 0.05) in the creative thinking among 10th grade female student
... Show MoreA key agreement protocol (KAP) is a fundamental block in any cryptosystem since it ensures secure communication between two parties. Furthermore, KAP should include advanced features in limited-resource environments such as IoT, in which this protocol must be lightweight and efficient in consuming resources. Despite the Elliptic Curve Diffie-Hellman (ECDH) algorithm having often been considered efficient in providing an acceptable security degree with less resource consumption, it has suffered from weakness against Man-In-The-Middle Attacks (MITMA). This paper presents two versions of the Variant Elliptic Curve Diffie-Hellman (VECDH) algorithms as a key agreement protocol. The security analysis indicates that the proposed algori
... Show MoreWe are used Bayes estimators for unknown scale parameter when shape Parameter is known of Erlang distribution. Assuming different informative priors for unknown scale parameter. We derived The posterior density with posterior mean and posterior variance using different informative priors for unknown scale parameter which are the inverse exponential distribution, the inverse chi-square distribution, the inverse Gamma distribution, and the standard Levy distribution as prior. And we derived Bayes estimators based on the general entropy loss function (GELF) is used the Simulation method to obtain the results. we generated different cases for the parameters of the Erlang model, for different sample sizes. The estimates have been comp
... Show More