Preferred Language
Articles
/
jcofarts-818
The effect of differentiated education strategy on the achievement of the students of the Institute of Fine Arts in the subject of aesthetics: وفاء شكر حسن
...Show More Authors

Current research targeted: Recognizing the impact of the differentiated education strategy on the achievement of the students of the Institute of Fine Arts / Diyala, for the academic year (2018-2019).
The researcher used the experimental approach designed by two groups (control - experimental) and with a post-test to achieve the goal of the research, and the research sample was chosen from students of the fourth stage for the academic year (2018-2019).
The sample was distributed randomly into two groups, the first experimental consisting of (30) students who studied using the differentiated education strategy, and the second control group consisting of (30) students who studied using the traditional method.
The researcher prepared an achievement test that measures the level of theoretical and technical information about aesthetics subject through objective questions divided into (30) test items with one (score) for the correct answer and (zero) for the wrong or abandoned answer.
The study found the effectiveness of using the differentiated education strategy in raising the level of achievement of the fourth stage students at the Institute of Fine Arts in the subject of aesthetics

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
College Of Islamic Sciences
Judge's Preaching to the Litigants and Witnesses An Applied Doctrinal Study on Judicial Decisions of Saudi Courts
...Show More Authors

Abstract

Praise be to Allah and prayers and peace be upon our Prophet, Muhammad, his family and all of his companions,

This research addresses the issue of judge's preaching to the litigants and witnesses; it is a very significant issue since the judge cannot know the insides and facts, but it issues judgments based on the hearings. Since people are originally wrong-doing and ignorant, they, therefore, commit injustice, oppression, false adversarial, and false testimony. However, some people can possibly retreat and return to the right, after being inattentive or recalcitrant, by preaching. This fact led scholars to talk about the judge's preaching to litigant and witnesses and this research is conducted

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 05 2022
Journal Name
Applied Nanoscience
RETRACTED ARTICLE: The impact of fear on a stage structure prey–predator system with anti-predator behavior
...Show More Authors

A prey-predator interaction model has been suggested in which the population of a predator consists of a two-stage structure. Modified Holling's disk equation is used to describe the consumption of the prey so that it involves the additional source of food for the predator. The fear function is imposed on prey. It is supposed that the prey exhibits anti-predator behavior and may kill the adult predator due to their struggle against predation. The proposed model is investigated for existence, uniqueness, and boundedness. After determining all feasible equilibrium points, the local stability analyses are performed. In addition, global stability analyses for this model using the Lyapunov method are investigated. The chance of occurrence of loc

... Show More
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Biochem. Cell. Arch
The evolutionary effects of bacillin and s-pyocin bacteriocin and their effects on propionibacterium acnes and fungi
...Show More Authors

ABSTRACT : Bacillus cereus and Pseudomonas aeruginosa is the ability to produce a wide antimicrobial active compounds (Bacillin and S-Pyocin) against pathogenic microorganism. In vitro assay with the antagonists of both crude bacteriocin and partial by precipitation 75% ammonium sulfate showed that the effectively inhibited growth of the following (Candida kefyer and Fusarium spp) and Propionibacterium acnes. The results showed the inhibition zone of reached Bacillin (9-13 mm), while Pyocin (13 - 16mm) in solid medium.

Scopus (9)
Scopus
Publication Date
Sat Apr 30 2022
Journal Name
Kufa Journal Of Engineering
Numerical Analysis for the Response of Skirt Circular Shallow Footing Resting on Sandy Soil under vertical loads
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (19)
Crossref (9)
Scopus Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
A Comparative Study on the Active Constituents, Antioxidant Capacity and Anti-Cancer Activity of Cruciferous Vegetable Residues
...Show More Authors

This study is pointed out to estimate the effectiveness of two solvents in the extraction and evaluating the active ingredients and their antioxidant activity as well as anti-cancer efficiency. Therefore, residues from four different Brassica vegetables viz. broccoli, Brussels sprout, cauliflower, and red cherry radish were extracted using two procedures methods: methanolic and water crude extracts. Methanol extracts showed the highest content of total phenolic (TP), total flavonoids (TF), and total tannins (TT) for broccoli and Brussels sprouts residues. Methanolic extract of broccoli and Brussels sprouts residues showed the highest DPPH· scavenging activity (IC50 = 15.39 and 18.64 µg/ml). The methanol and water ex

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Journal Of Baghdad College Of Dentistry
The influence of prophylactic Dexamethasone on postoperative swelling and trismus following impacted mandibular third molar surgical extraction
...Show More Authors

Background: Pain, swelling and trismus are the main minor complications encountered after surgical extraction of impacted third molars, minimizing these postoperative complications is the center of many studies, one proposed method is the prophylactic administration of corticosteroids, the aim of this study is to evaluate the effect of prophylactic Dexamethasone administration on facial swelling and trismus after surgical extraction of impacted third molars. Materials and methods: 20 patients were included in this study, they were randomly divided into 2 groups of 10 patients each; a study group in which patients were given 8 mg. Dexamethasone 1 hour before surgical extraction of impacted third molar and 4 mg. 6 hours postoperatively, and a

... Show More
Publication Date
Sun Jun 30 2024
Journal Name
Sabrao Journal Of Breeding And Genetics
PHYTOHORMONES, BIO- AND MINERAL FERTILIZERS EFFECTS ON THE GROWTH AND SECONDARY COMPOUNDS OF CHAMOMILE (MATRICARIA CHAMOMILLA L.)
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat Nov 15 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Effects of time delay and tension system application after final flask closure on the vertical displacement of acrylic and porcelain teeth in maxillary complete dentures
...Show More Authors

Background: The displacement of artificial teeth during complete denture construction presents major processing errors in the occlusal vertical dimension which were verified at the previous trial denture stage. The aim of this study was to assess the effect of delay in processing after final flask closure and tension application on the vertical acrylic and porcelain teeth displacement of complete dentures constructed from heat cured acrylic and the results were compared with the conventional processing method. Materials and methods: forty samples of identical maxillary complete dentures were constructed from heat polymerized acrylic resin. These samples were subdivided into the following experimental subgroups in which each subgroup contai

... Show More
View Publication Preview PDF