The goal of this study is to investigate the relationship between the student and the teacher and the student's behavior for a subject of the student in the intermediate stage, the sample contained (568) student, (266) male and (302) female.
The scale of student – teacher relationship was built according to a questionnaire pointed to a sample of the students, adding to that reviewing a number of previous scales and studies which was about the same topic, and in the same way a measure of student behavior was constructed.
Results showed that there was significant relation between the student's teacher relationship and student behavior, and the level of student- teacher relationship is higher than the average of the population that is there a positive relationship ,as well as the level of student behavior is higher than the average of the population ,that is their behavior is positive, also results showed that there were no significant differences in student-teacher relationship and student behavior in individuals based on gender.
Key words: (1)Student _teacher relationship (2)Student behavior
The Middle East fat tailed sheep Ovis aries L. examined within the boundaries of Al-Anbar province, western Iraq was found to acquire seven species of ixodid ticks namely, Hyalomma
anatolicum, H. excxavatum, H. marginatum turanicum, H. detritum, Hyalomma sp., Rhipicephalus turanicus and R. s. sanguineus. The results discussed with the pertinent
literature.
Groundwater is considered as one of the most important sources of fresh-water, on which many regions around the world depend, especially in semi-arid and arid regions. Protecting and maintaining groundwater is a difficult process, but it is very important to maintain an important source of water. The current study aims to assess the susceptibility of groundwater to pollution using the DRASTIC model along with the GIS environments and its tool boxes. A vulnerability map was created by relying on data collected from 55 wells surveyed by the researchers as well as archived records from governmental institutions and some international organizations. The results indicate that the region falls into three vulnerability functional zones , namely
... Show MoreThis paper presents a point multiplication processor over the binary field GF (2233) with internal registers integrated within the point-addition architecture to enhance the Performance Index (PI) of scalar multiplication. The proposed design uses one of two types of finite field multipliers, either the Montgomery multiplier or the interleaved multiplier supported by the additional layer of internal registers. Lopez Dahab coordinates are used for the computation of point multiplication on Koblitz Curve (K-233bit). In contrast, the metric used for comparison of the implementations of the design on different types of FPGA platforms is the Performance Index.
The first approach attains a performance index
... Show MoreAn analytical procedure has been carried out to measure the charge that may be trapped in an insulator sample of scanning electron microscope. It mainly concerns the determination of the deduced polarization charges by means of mirror effect phenomenon. Several relations related to such issue have been modified so as to be applicable for regarding charges due to polarization in linear and isotropic material. Consequently, the potential arises as a result for both trapped free and polarization charges which is set up. Actually the well-known magnification factor method is adopted to be a case study to implement the introduced approach. Results have clearly showed that the polarization charge significantly influences the Coul
... Show MoreCrime has become a phenomenon associated with human socialization. Wherever human groups are found, a crime, which differs from one society to another, is found. It is one of the most dangerous social issues that undermines the solidarity of a given society. This is because it establishes a takeoff from community's norms, values, customs and traditions, and thus turns into a danger to the lives of people, groups and society that threatens its strength and security. The paper focuses on the crimes that violate the social law, like child rape, incest and electronic extortion, which are increasing in size, increasing as a result their repercussions on the human society. The study seeks several objectives, including: examining the natu
... Show MoreLaser scanning has become a popular technique for the acquisition of digital models in the field of cultural heritage conservation and restoration nowadays. Many archaeological sites were lost, damaged, or faded, rather than being passed on to future generations due to many natural or human risks. It is still a challenge to accurately produce the digital and physical model of the missing regions or parts of our cultural heritage objects and restore damaged artefacts. The typical manual restoration can become a tedious and error-prone process; also can cause secondary damage to the relics. Therefore, in this paper, the automatic digital application process of 3D laser modelling of arte
In this study, the possible protective effects of daidzein on ifosfamide-induced neurotoxicity in male rats were examined by the determination of changes in selected oxidant–antioxidant markers of male rats’ brain tissue.
Twenty-eight (28) apparently-healthy Wistar male rats weighing (120-150gm) allocated into 4 groups (n=7) were used in this study. Rats orally-administered 1% tween 20 dissolved in distilled water/Control (Group I); rats were orally-administered daidzein suspension (100mg/kg) for 7 days (Group II); rats intraperitoneally-injected with a single dose of ifosfamide (500 mg/kg) (Group III); rats orally-administered for 7 days with the daidzein (100mg/
... Show More
Detection of virulence gene agglutinin-like sequence (ALS) 1 by using molecular technology from clinical samples (
In this work, the possibility of a multiwavelength mode-locked fiber laser generation based on Four-Wave Mixing (FWM) induced by Fe2O3-SiO2 nanocomposite material is investigated for the first time. A multiwavelength mode-locked pulses fiber laser are generated from Ytterbium–doped fiber laser (YDFL) due to the combined action of high nonlinear absorption and high refractive coefficients of Fe2O3-SiO2 nanocomposite incorporated inside YDFL ring cavity. Up to more than 20 lasing lines in the 1040–1070 nm band with an equally lines separation of ~0.6 nm have been observed by just simple variation of passive modulation of the state of the polarization and the pump power altogether. Moreover, a passively mode-locked operation of YDFL laser
... Show MoreAfter the Napoleonic Code of 1804 came without any legal rules specific to the duration of the contract, and was content to refer to it in scattered legal texts, Legislative Decree No. 2016-131 came to establish a comprehensive legal system for the duration of the contract, starting from the period of its formation, through the period of its implementation, and ending with its continuation after the expiration of its term, in the third section of the fourth chapter related to the effects of the contract (Articles 1210 - 1215), relying on judicial precedents on the one hand - which are many, as will be shown through the research pages - and contractual practices on the other hand. Perhaps the main motive that prompted the French legislator t
... Show More