The study aims to identify the level of modesty and self-assertiveness among Tikrit university’s students in regard with students’ gender and major (scientific, human studies), and to identify the correlation between modesty trait and self-assertiveness of students. To this end, the researcher has designed a scale to measure modesty that consisted of four-domains (decency, avoiding of unattractive, pang of conscience, and apprehension). Moreover, the researcher adopted a scale of self-assertiveness that designed by (shawki, 1998). The sample included (600) student on first-stage at the university of Tikrit. The results revealed that students have a high level of modesty and self-assertiveness; there is a correlation between modesty trait and self-assertiveness; female has a high level of modesty than male do. Modesty showed a high level at scientific studies than that of human studies, and finally, gender showed no significant difference in self-assertiveness, but self-assertiveness showed significant difference in regard of scientific studies
In this research two algorithms are applied, the first is Fuzzy C Means (FCM) algorithm and the second is hard K means (HKM) algorithm to know which of them is better than the others these two algorithms are applied on a set of data collected from the Ministry of Planning on the water turbidity of five areas in Baghdad to know which of these areas are less turbid in clear water to see which months during the year are less turbid in clear water in the specified area.
The aim of this paper is to introduce the concept of N and Nβ -closed sets in terms of neutrosophic topological spaces. Some of its properties are also discussed.
The use of external posttensioning technique for strengthening reinforced concrete girders has been considerably studied by many researchers worldwide. However, no available data are seen regarding strengthening full-scale composite prestressed concrete girders with external posttensioned technique under static and repeated loading. In this research, four full-scale composite prestressed I-shape girders of 16 m span were fabricated and tested under static and repeated loading up to failure. Accordingly, two girders were externally strengthened with posttensioned strands, while the other two girders were left without strengthening. The experimental tests include deflection, cracking load, ultimate strength and strains at midspan, a
... Show MoreA series of new coumarin and N-amino-2-quinolone derivatives have been synthesized. The reaction of coumarin (1) with excess of Hydrazine hydrate 98% yielded 1-amino-2-quinolone (2), Compound (2) was reacted with different Sulfonyl chloride to yield Sulfonamides [ N-(2-oxoquinolin-1(2H)-yl) methane sulfonamide (3), N-(2-oxoquinolin-1(2H)-yl) Benzene sulfonamide (4) and 4-methyl-N-(2-oxoquinolin-1(2H)-yl) benzene sulfonamide (5) ], while reaction of 2-(4-methyl-2-oxo-2H-chromen-7-yloxy) acetic acid (8) with different amines yielded compounds [ 2-(4-methyl-2-oxo-2H-chromen-7-yloxy)-N-(2-oxoquinolin-1(2H)-yl) acetamide (9) and N-(5-methyl-1,3,4-thiadiazol-2-yl)-2-(4-methyl-2-oxo-2H-chromen-7-yloxy)acetamide (10) ] th
... Show MoreIn this study, experimental and numerical applied of heat distribution due to pulsed Nd: YAG laser surface melting. Experimental side was consists of laser parameters are, pulse duration1.3
Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show More