For many years, reading rate as word correct per minute (WCPM) has been investigated by many researchers as an indicator of learners’ level of oral reading speed, accuracy, and comprehension. The aim of the study is to predict the levels of WCPM using three machine learning algorithms which are Ensemble Classifier (EC), Decision Tree (DT), and K- Nearest Neighbor (KNN). The data of this study were collected from 100 Kurdish EFL students in the 2nd-year, English language department, at the University of Duhok in 2021. The outcomes showed that the ensemble classifier (EC) obtained the highest accuracy of testing results with a value of 94%. Also, EC recorded the highest precision, recall, and F1 scores with values of 0.92 for the three performance measures. The Receiver Operating Character curve (ROC curve) also got the highest results than other classification algorithms. Accordingly, it can be concluded that the ensemble classifier is the best and most accurate model for predicting reading rate (accuracy) WCPM.
Cardiovascular risk is independently increased by plasma lipids abnormalities (low- density and high density lipoprotein -cholesterol and triglycerides). Most patients have more than one lipid abnormality. Combination therapy with lipid-modifying agents could offer an important therapeutic option for improving the overall lipid profile. Combinations have demonstrated to provide additive efficacy and significant reductions in coronary events . This study was designed to evaluate the effect of ezetimibe, when used in combination with other hypolipidaemic agents ( statins) on lipid profile as well as on liver function ,renal function, oxidative stress, and platele
... Show MoreThe current research aims to identify the stressful life events among middle school students in terms of gender (male-female), academic branch (scientific-literary), and the Life Skills of the students of the preparatory stage in terms of gender (male-female), and academic branch (scientific-literary). Additionally, the study aims to identify the relationship between stressful life events and life skills in middle school students. A sample of (200) students who were selected randomly from the Directorate of education of Baghdad Karkh/ III was used in this study. To achieve the objectives of the current research, the researcher has adopted two scales, the stressful life events scale for the researcher Al-Sultan (2008), and the life skills
... Show MoreThe present work involved two steps: the first step include Mannich reaction was carried out on 2- mercaptobenzimidazole using formaldehyde and different secondary amine or amide to gives the compounds(2-16). The secnd step include preparation of (Ethylbenzimidazoly-2-mercaptoacetate)(17) from the reaction of 2- mercaptobenzimidazole with ethylchloroacetate than prepared hydrazide derivative[18]from reaction of compound(17) with hydrazinehydrate. Followed Preparation of shiff bases(19-24) and there reaction with mercaptoacetic acid to give a new compounds containing thiazolidinderivetives(25-30).Structure confirmation of all prepared compound were proved using FTIR and element analysis (C.H.N.S) and mesurmentedmelting poi
... Show MoreEriobotrya japonica Lindl., named as loquat, is a subtropical fruit tree of the family Rosaceae which is well known medical plant originated in Japan and China. Loquat portions, like leaves, peels and fruits have been shown to possess various health usefulnesses. In Chinese classical medicine, it is vastly utilized in many illnesses, like gastroenteric disorders, diabetes mellitus, pulmonary inflammatory diseases and chronic bronchitis. Loquat plant contain many active constituents, such as flavonoids, carotenoids, vitamins, polyphenolic compounds, other that have many biological effects like anti-tumor, anti-diabetic, anti-inflammatory, anti-mutagenic, antioxidant, antiviral, antitussive, hepatoprotective and hypoli
... Show MoreIn this study, the preparation and characterization of hyacinth plant /chitosan composite, as a heavy metal removal, were done. Water hyacinth plant (Eichhorniacrasspes) was collected from Tigris river in Baghdad. The root and shoot parts of plant were ground to powder. Composite materials were prepared at different ratios of plant part (from 2.9% to 30.3%, wt /wt) which corresponds to (30-500mg) of hyacinth plant (root and shoot) and chitosan. The results showed that all examined ratios of plant parts have an excellent absorption to copper (Cu (II)). Moreover, it was observed that 2.9% corresponds (30mg) of plant root revealed highest removal (82.7%) of Pb (II), while 20.23% of shoot removed 61% of Cd (II) within 24 hr
... Show MoreVitamin D is a fat-soluble vitamin with antioxidant and DNA protecting properties , Levofloxacin is a member of the fluoroquinolone drug class, Its broad-spectrum bactericidal effect affects both Gram-positive and Gram-negative bacteria.
The goal of the study is to analyze the haematology analysis in rats received levofloxacin and show the preventive impact of vitamin D3 by analyzing the haematology parameters: packed cell volume (PCV), mean corpuscular hemoglobin concentration(MCHC),haemoglobin (HB), red blood cell (RBC), mean corpuscular volume (MCV),meancorpuscular haemoglobin(MCH), WBC ,differential WBC, and Platelets.
The study included 42 rats divided into 6 groups each group 7 rats. group I negative control
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThis research aims primarily to highlight personal tax exemptions A comparative study with some Arab and European regulations. And by conducting both theoretical comparative analyses. Most important findings of the study is the need to grant personal and family exemptions that differ according to the civil status of the taxpayer (single or married). In other words, the exemption increases as the number of family members depend on its social sense. Also taking into account some incomes that require a certain effort and looking at the tax rates, it is unreasonable for wages to be subject to the same rates applied to commercial profits.