The study aims to identify the level of modesty and self-assertiveness among Tikrit university’s students in regard with students’ gender and major (scientific, human studies), and to identify the correlation between modesty trait and self-assertiveness of students. To this end, the researcher has designed a scale to measure modesty that consisted of four-domains (decency, avoiding of unattractive, pang of conscience, and apprehension). Moreover, the researcher adopted a scale of self-assertiveness that designed by (shawki, 1998). The sample included (600) student on first-stage at the university of Tikrit. The results revealed that students have a high level of modesty and self-assertiveness; there is a correlation between modesty trait and self-assertiveness; female has a high level of modesty than male do. Modesty showed a high level at scientific studies than that of human studies, and finally, gender showed no significant difference in self-assertiveness, but self-assertiveness showed significant difference in regard of scientific studies
This study aimed to evaluate serum levels of steroid hormones and human chorionic gonadotropin (hCG) hormone in preeclamptic Iraqi pregnancies compared to those of healthy pregnancies.This study enrolled 120 pregnant women, divided into four groups:1. 30 healthy pregnant women.2. 37 pregnant women with mild preeclampsia3. 53 pregnant women with severe preeclampsia4. 90 pregnant women with preeclampsia Preeclamptic women and their severe cases but not mild cases had significantly (P<0.01) increased levels of serum hCG as compared with healthy pregnancies. By contrast, sera levels of estradiol were significantly (P<0.01) decreased in total preeclamptic groups and their severe cases but not in mild group as compared to healthy pregnant wome
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreDescribed the Arabic language being of genius sets by top models of eloquence , rhetoric and clarity of sounds and developments Moreover , it is an important element of our existence and our identity and our survival . That my methods and best in teaching Arabic language what has pursued the easiest ways to learning and teaching and helped learners to be aware of the function linguistic information , and they need it and its impact on their lives , and contributed to unleashing the potential of activism and led them to make the effort to apply them in the form of examples and uses of new life , as well as fits are the capabilities and tendencies of different learners , so the goal of current research into the importance of the curriculum
... Show MoreA critical milestone in nano-biotechnology is establishing reliable and ecological friendly methods for fabricating metal oxide NPs. Because of their great biodegradable, electrical, mechanical, and optical qualities, zirconia NPs (ZrO2NPs) attract much interest among all zirconia NPs (ZrO2NPs). Zirconium oxide (ZrO2) has piqued the interest of researchers throughout the world, particularly since the development of methods for the manufacture of nano-sized particles. An extensive study into the creation of nanoparticles utilizing various synthetic techniques and their potential uses has been stimulated by their high luminous efficiency, wide bandgap, and high exciton binding energy. Zirconium dioxide nano
... Show MoreOur goal in this research, some new nucleoside analogues was synthesized. Starting from ?-D glucose which was converted to per acetylated ?-D gluco pyronoside then converted to active from(1-Bromo Sugar (2) as a sugar moiety.The base moiety 2-substituted benzimidazole was prepared from condensation of phenylene diamine with different aromatic aldehydes, which were subjected to amino alkylation via Mannich reaction forming new nucleobase derivatives. Condensation of nucleobase with bromo sugar through nucleophilic substitution of anomeric carbon with nitrogen forming new protected nucleoside analogues then hydrolyzed with sodium methoxide in methanol to obtain our target, the free nucleoside analogues. All prepared compound were identified b
... Show MoreMicrofinance Institutions (MFIs) offers small loans with easy repayment system and till now these institutions have served millions of needy people around the globe. This study highlights the hurdles influence the smooth working and growth of Microfinance institution in Egypt. The structured interviews were conducted from the top and mid-level managers of MFI's. This study revealed that interest rate, political and economic conditions, corruption, customer outreach, competition and technology are the important elements for MFI's success. It is evident that lack of use of technology and less importance drawn on customer outreach programs are the main challenges of MFI's in Egypt. This study provides a roadmap for practitioners and strategic
... Show MoreThe increasing use of plastics in various aspects of modern life resulted in the availability of enormous amount of wastes, including a negative effect on the environment and humans. So it is necessary to find solutions to deal with these wastes and ensure to use them as solutions to use in concrete mix . In this research the production of concrete containing high and low density polyethylene has been used by (5, 10, 15)% as a replacement of part of the volume of sand, so as to obtain concrete good compressive strength as well as other benefits such as improved possibility of pumping concrete and reduce the loss of concrete for workability polymer is a material that is non-absorbable of water . It is also intended to dispose of these was
... Show More
The prophet said that it anybody burdened any of the people or the book more than they could endure he would ben his opponent until the day of judgment.
-under the rightly guided caliphs the Christians had much freedom .this is shown by a letter attributed to ishu-yab III. The Nestorian catholics.
-The third caliph,Uthman favoured the Christians either because of the spcial skills or abilities which they possessed or through the imfluence of his Christian wife Na'ila.
-Under the early Umayyade,the christiansins the Isalamic umma had as much freedom as they had previously enjoyed under the best of their Christians governments because they restorted their churches and appointed many Christians to the
... Show MoreThe main aim of the current research is to focus the light on some bacterial contamination on cracked eggshell and egg content plus studying the sensitivity of these bacterial isolates to antibiotics. For this purpose, a total of 50 eggs were collected from the markets in Baghdad city (Iraq) and examined for bacterial isolation from cracked eggshells and from the egg contents. The bacterial isolates were cultured and purified then transferred to a specific media to study its sensitivity against antibiotics. The results revealed that bacteria isolated from both cracked eggshells (46%) and egg contents (44%). The bacteria isolated include E. coli, Staphylococcus, Enterococcus faecalis, Enterobacter and Pseudomonas. The results of antibiotic s
... Show MoreCloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to mak
... Show More