The research aims to measure the psychological security of social working in the courts, to measure the motivation of achievement for social researchers working in the courts. In addition to, identify the Psychological security and its relation to the motivation of achievement for social researchers working in the courts. To achieve these aims, the researcher adopted two scales: Maslow scale for Psychological security, which was translated to Arabic by Dwany and Dirany 1983 consisted of (75) items. The second scale is Othman scale for achievement motivation 2014 consisted of (24) items. The two scales had been applied to a sample consisted of (100) social researchers working in the courts of Baghdad with its two branches Al-karkh and Al-Risafa for the academic year (2018-2019). The researcher found out a correlation between Psychological security and motivation for the achievement of social researchers working in the courts. The researcher concluded this study with a number of recommendations and suggestions.
Aims current research to identify the mistakes coding contained in the reading first grade. Encoding knew that he had failed in Retrieval or identifying information, the researcher diagnosis of mistakes and presented to a group of teachers first grade and they have an appropriate adjustment and using the percentage shows that the agreement on the mistakes ratio and adjusted researcher recommended a set of proposals and recommendations can work out the future for the advancement of scientific level
هدفت الدراسة الحالية إلى ( معرفة اثر استراتيجية مقترحة وفقا لنظرية الرياضيات الواقعية في التحصيل والترابط الرياضي لدى طالبات الصف الثالث المتوسط)، تم اختيار مجموعتين من صف الثالث المتوسط في مدرسة تابعة للمديرية العامة لتربية بغداد- الرصافة الاولى للعام الدراسي(2022-2021) تمثل المجموعة التجريبية والتي تدرس على وفق الاستراتيجية المقترحة وبلغ عدد طالباتها(30)، والمجموعة الضابطة التي تدرس بالطريقة الاعتيادية وبلغ
... Show MoreIn this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.
Abstract In light of the changing conditions that prevail in society, and the intense competition that institutions and countries are forced to face, especially after the opening of markets, and the transformation of the world into what is called a small village, entrepreneurship has emerged as an important tool for dealing with the developments of societies, whether it is related to individual business projects or Economics for national business, leadership was the key to any driving force towards achieving growth. Today, women are no longer captive to a specific orientation, but rather all horizons and fields of work have been opened to them, and they have been able to occupy the most important economic, voluntary, service, and
... Show MoreIn this investigation a high density polyethylene (HDPE) was used as a substitute to polyvinylchloride in the production of lead acid battery separators. This has been achieved by preparing mixtures of different percentages of the feed materials which include a high density polyethylene (HDPE) locally produced, filler materials such as silica and oils such as dioctylphthalate (DOP) or paraffin which were added to the mixture to improve the final properties of the separator. The materials were compounded by two roll-mills under the same conditions. The following parameters are involved: &nb
... Show More