Ziziphora persica Bunge is recorded as a new Study in Iraq. This species has been collected from Jabal Sinjar in Nineveh province in the north western part of Iraq. The morphological characters, habitat and geographical distribution of the species with a key to Ziziphora L. species in Iraq have been provided.
To achieve the goals, the researcher followed the design of equal and independent groups of partial control and post-test . The research has chosen the Institute of Fine Arts in the area Almansour area as deliberate sample where three sections of students have been chosen and the number of students is (69) students. The researcher conducted equivalence in the variables (age, and IQ , and the overall rate for grade III). in diagnostic phase, (21) concepts of alternative image out of (46) concepts have been identified in addition to the goals of formulation of acquisition concepts according to the three processes (definition, discrimination and application). Achievement test has been
... Show MoreThe problem of present study is determined by answering the following questions:
1) What is the effect of using the oral open- ended questions on Students' achievement in the third-stage of Arabic department in the college of Education? 2) What is the effect of the oral open-ended questions on developing the creative thinking of students in
... Show MoreBackground: One of the most predominant periodontal diseases is the plaque induced gingivitis. For the past 20 years, super-oxidized solutions have be..
The tourism industry has undergone exponential transformation, reshaped by online travel agencies (OTAs), shifting consumer preferences, and technological advancements. Established OTAs like TripAdvisor and Travelocity face pressures to adapt their strategies to capitalize on these disruptive landscape changes. This research involves a comparative analysis examining the key challenges confronting TripAdvisor and Travelocity, with a focus on opportunities to leverage artificial intelligence (AI) in enhancing personalization and the traveler experience. The study utilizes publicly available data on the companies and academic literature on AI innovation diffusion. Findings reveal that while TripAdvisor has actively developed AI-based trip plan
... Show MoreThe Boltzmann transport equation is solved by using two- terms approximation for pure gases and mixtures. This method of solution is used to calculate the electron energy distribution function and electric transport parameters were evaluated in the range of E/N varying from . 172152110./510.VcmENVcm
The electron energy distribution function of CF4 gas is nearly Maxwellian at (1,2)Td, and when E/N increase the distribution function is non Maxwellian. Also, the mixtures are have different energy values depending on transport energy between electron and molecule through the collisions. Behavior of electrons transport parameters is nearly from the experimental results in references. The drift velocity of electron in carbon tetraflouride i
Ti6Al4V alloy is widely used in aerospace and medical applications. It is classified as a difficult to machine material due to its low thermal conductivity and high chemical reactivity. In this study, hybrid intelligent models have been developed to predict surface roughness when end milling Ti6Al4V alloy with a Physical Vapor Deposition PVD coated tool under dry cutting conditions. Back propagation neural network (BPNN) has been hybridized with two heuristic optimization techniques, namely: gravitational search algorithm (GSA) and genetic algorithm (GA). Taguchi method was used with an L27 orthogonal array to generate 27 experiment runs. Design expert software was used to do analysis of variances (ANOVA). The experimental data were
... Show MoreObjective: The study aims at evaluating the psychological support and discharge plan from the hospital provided by nurses for woman undergone hysterectomy.
Methodology: The study uses descriptive design and non-probability (convenient) sample which is consisted of (40) nurses from (8) teaching hospitals in the City of Baghdad within the maternity wards. The study is carried out from 11 November 2020 to 27 June 2021. A observational tool is developed to evaluate the psychological support and the discharge plan after surgery. Content validity and internal consistency reliability are determined through pilot study. Data are collected through the use of the questionnaire and data are analyzed through the use of descriptive and inferentia
The monetary policy is a vital method used in implementing monetary stability through: the management of income and adjustment of the price (monetary targets) in order to promote stability and growth of real output (non-cash goals); the tool of interest rate and direct investment guides or movement towards the desired destination; and supervisory instruments of monetary policy in both quantitative and qualitative. The latter is very important as a standard compass to investigate the purposes of the movement monetary policy in the economy. The public and businesses were given monetary policy signals by those tools. In fiscal policy, there are specific techniques to follow to do the spending and collection of revenue. This is done in order to
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show More