Preferred Language
Articles
/
jcoeduw-15
The Reasons for the Behavior of Bullying school Students in the first grade average from the point of view of teachers and teachers and methods of modification
...Show More Authors

 هدف البحث التعرف الى اسباب سلوك التنمر لدى طلاب الصف الاول المتوسط من وجهة نظر المدرسين والمدرسات واساليب تعديله، واستعمل الباحثان المنهج الوصفي واختيار عينة عشوائية من المدرسين والمدرسات في متوسطة أرض الرافدين ومتوسطة الرحمن للبنين وكان عددهم (46) مدرساً ومدرسة بواقع (32) مدرساً و(14) مدرسة، واعتمد الباحثان الاستبانة أداة للتعرف الى اسباب سلوك التنمر واساليب تعديله، واشارت نتائج البحث الى تنوع اسباب التنمر : ذاتية واسرية ومرتبطة بالبيئة المدرسية  ومرتبطة بالبيئة المجتمعية المحيطة ومرتبطة بالإعلام والثورة التقنية ، اذ تضمنت الاستبانة (45) سبباً من أسباب سلوك التنمر المدرسي ، واشتملت استبانة اساليب تعديل سلوكيات التنمر المدرسي على (32) اسلوباً مرتبة تنازليا بحسب وسطها المرجح ووزنها المئوي، وفي ضوء نتائج البحث تبلورت بعض الاستنتاجات   والتوصيات والمقترحات

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
Code-Switching in Language : An Applied Study: تغییر الشفرة اللغویة: دراسة تطبیقیة
...Show More Authors

.

View Publication Preview PDF
Publication Date
Thu Mar 01 2018
Journal Name
Tribology International
Discriminating gasoline fuel contamination in engine oil by terahertz time-domain spectroscopy
...Show More Authors

View Publication
Scopus (14)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
New Research Trends in Designing E-Government Architecture Based on Blockchain Technology
...Show More Authors

Blockchain has garnered the most attention as the most important new technology that supports recent digital transactions via e-government. The most critical challenge for public e-government systems is reducing bureaucracy and increasing the efficiency and performance of administrative processes in these systems since blockchain technology can play a role in a decentralized environment and execute a high level of security transactions and transparency. So, the main objectives of this work are to survey different proposed models for e-government system architecture based on blockchain technology implementation and how these models are validated.  This work studies and analyzes some research trends focused on blockchain

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 15 2020
Journal Name
Al-academy
Dramatic Construction in Quranic Text Surah Taha – A model: جبار خماط حسن
...Show More Authors

There are many varied studies that dealt with the dramatic construction, especially books and studies that addressed drama in its construction and the method of writing it, that no textbook or a general cultural content is void of tackling the dramatic text in its construction and how the dramatic action develops in it. Therefore, a question occurs to the mind about the feasibility of dealing with the dramatic construction in this time, where many contemporary studies of dramatology and its relation and the contemporary critical directions are accumulating. This question many have two realistic aspects, yet the novelty and originality that this research shows lie in addressing a refined linguistic text in its style and connotations, such

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
Strangeness Concept in Commercial Advertisement Design: يوسف مهدي سعيد -سحر علي سرحان
...Show More Authors

  Strangeness in design generally and in advertisement design specifically is manifested in various images and creative propositions and shapes that depart the traditional and conventional framework to elevate design to virtual intellectual worlds related to the inspirational and imaginative range of the creative designer, which makes the forms of strangeness a means for persuasion and astonishment which achieves the functional and aesthetic objectives of the advertisement. The two researchers identified the research question "what is the concept of strangeness in the commercial advertisements design? The research objective has been determined by identifying the concept of strangeness in the commercial advertisement design. Strangen

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 19 2024
Journal Name
Baghdad Science Journal
GRHPR gene variations in Iraqi patients infected with calcium oxalate kidney stones
...Show More Authors

      The alterations in glyoxylate reductase and hydroxy-pyruvate reductase concentrations in the sera and the genetic alterations associated with calcium oxalate kidney stones in Iraqi patients were not studied previously so this study aimed to focus on these points. This study included 80 subjects; they were 50 patients with calcium oxalate stones compared to 30 apparently healthy controls. Biochemical investigations for kidney functions (creatinine, urea, and uric acid), were performed on the sera of both groups. Also, complete blood count, random blood sugar, and blood group tests. Furthermore, urine had been collected for General Urine Examination to visualize oxalate crystals in the urine of the patient. Also, the GRHPR

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Česká A Slovenská Farmacie
Hyperferritinemia as a factor associated with poor prognosis in COVID-19 patients
...Show More Authors

Worldwide, hundreds of millions of people have been infected with COVID-19 since December 2019; however, about 20% or less developed severe symptoms. The main aim of the current study was to  assess  the  relationship  between  the  severity of Covid-19 and different clinical and laboratory parameters. A total number of 466 Arabs have willingly joined this prospective cohort. Out of the total number, 297 subjects (63.7%) had negative COVID-19 tests, and thus, they were recruited as controls, while 169 subjects (36.3%) who tested positive for COVID-19 were enrolled as cases. Out of the total number of COVID-19 patients, 127 (75.15%) presented with mild symptoms, and 42 (24.85%) had severe symptoms. The age range for the partic

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Sep 25 2024
Journal Name
Dentistry 3000
Maximum mouth opening measurement in relation to maximum bite force among children
...Show More Authors

Objective: This research aimed to study the relation between maximal bite force (MBF) and maximum mouth opening among 12-year-old school children. Methods: In this cross-sectional study, a total of 400 children aged 12 years (194 boys and 206 girls) were examined. The MBF for the right and left side, as well as the anterior region, were evaluated for all children. The MMO was measured using an electronic digital caliper. To analyze the data path analysis method was used. Results: Boys showed a higher MMO of 48.797 ± 6.500 than girls (46.710 ± 5.926 mm). The MMO increased with increasing MBF, with significant differences between females and males. Conclusion: The MMO was higher in boys than in girls. Gender plays a significant ro

... Show More
View Publication
Crossref
Publication Date
Sat Dec 31 2022
Journal Name
International Journal Of Intelligent Engineering And Systems
Dynamic Virtual Network Embedding with Latency Constraint in Flex-Grid Optical Networks
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref