The current research aims to recognize the exploratory and confirmatory factorial structure of the test-wiseness scale on a sample of Hama University students, using the descriptive method. Thus, the sample consists of (472) male and female students from the faculties of the University of Hama. Besides, Abu Hashem’s 50 item test-wiseness scale (2008) has been used. The validity and reliability of the items of the scale have also been verified, and six items have been deleted accordingly. The results of the exploratory factor analysis of the first degree have shown the presence of the following five acceptable factors: (exam preparation, test time management, question paper handling, answer sheet handling, and revision). Moreover, (63.391%) of the overall variance has been explained. By conducting the second degree of the factorial analysis of the five factors, it has been shown that there is one main factor that is acceptable. Its eigenvalues are (2.821). In addition, (56.429%) of the overall variation has been illustrated and identified as a factor (test-wiseness). The results of the confirmatory factor analysis have also revealed that there is a congruence between the supposed model and the realistic model, and that the 44 item test-wiseness scale in its modified Syrian form is characterized by its high indicators of validity (content validity, structural validity, discriminative validity) and reliability (split half, internal consistency using Cronbach's alpha coefficient).
Educational services in Iraq face many problems that have reduced the efficiency of the educational process, as a result of the difficult conditions experienced by educational services in Iraq. This led to the accumulation of these problems and their exacerbation significantly over the years, as there was no fundamental solution to these problems. The study proposes a planning method for managing the educational system in Iraq, especially for the primary and secondary levels, where these negative phenomena are very prominent, especially the deficit in school buildings and the phenomenon of overcrowding in classrooms. &am
... Show MoreAt the time when many important political events and evolutions took place, the cinema has been pretty active, and witnessed the historical events before and after the two world wars and the cold war. During the first half of the 20th century, the cinema had great interest from the major countries and their politicians, as well as the commercial turnout of large companies to invest in that field for the profits. In the beginning of the 20th century, the major powers like the Soviet Union, the United States, Germany, Italy, England, and France started to compete in the development of their film industry and the investment of the new medium and the transformation of some famous works of fiction into films that perpetuate their cultur
... Show MoreHerein, we report designing a new Δ (delta‐shaped) proton sponge base of 4,12‐dihydrogen‐4,8,12‐triazatriangulene (compound
This paper deals with the blow-up properties of positive solutions to a parabolic system of two heat equations, defined on a ball in associated with coupled Neumann boundary conditions of exponential type. The upper bounds of blow-up rate estimates are derived. Moreover, it is proved that the blow-up in this problem can only occur on the boundary.
A specific, sensitive and new simple method was used for the determination of methyldopa in pure and pharmaceutical formulations by using continuous flow injection analysis. This method is based on formation of ion pair compound between methyldopa and potassium hexacyanoferrate in acidic medium to obtain a yellow precipitate complex using long distance chasing photometer (NAG-ADF-300-2). The linear range for calibration graph was 0.05-35 mmol/L for cell A and 0.05-25 mmol/L for cell B, and LOD 1.4292 µg /200 µL for both cells with correlation coefficient (r) 0.9981 for cell A and 0.9994 for cell B, RSD% was lower than 0.5 % for n=8 for. The results were compared with classical method UV-Spectrophotometric at λ max=280 nm and turbi
... Show MoreThis research focused up on the Seismic reflection study of a 268.7 km2 area located in the central of Iraq within the Karbala province (Kifl area). The seismic data were reprocessed by Anadarko Petroleum Corporation and its partners Dome International and Vitol with OEC in 2005, the result of processing works has improved the quality of seismic sections in most of the study area. The study area was interpreted by using 3-D seismic data from the Oil Exploration Company. By studying the seismic sections and applying seismic attributes (instantaneous phase) Faults were picked across 3D seismic volume of the studied reflectors. The study area affected by a major fault and minor normal faults, Two fa
... Show MoreCNC machines are widely used in production fields since they produce similar parts in a minimum time, at higher speed and with possibly minimum error. A control system is designed, implemented and tested to control the operation of a laboratory CNC milling machine having three axes that are moved by using a stepper motor attached to each axis. The control system includes two parts, hardware part and software part, the hardware part used a PC (works as controller) connected to the CNC machine through its parallel port by using designed interface circuit. The software part includes the algorithms needed to control the CNC. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD or 3D MAX and is saved in a we
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show More