The textbook is the primary means of creativity and thinking, which has a major role in the development of the readership and mental abilities of the student. It is the basic tool in education in Iraq for the teacher and the student, which cannot be dispensed in any educational program. The current study aimed at the book of the biology of the sixth grade of science in Iraq (comparative study). It was compared to the book of biology for the twelve grade in the Kingdom of Jordan to identify the ratio of similarity and differences between them, in addition, to identify the weaknesses in the Iraq curriculum and developing appropriate solutions and suggestions to address them. The sample was represented with books of biology (six-science class in Iraq and twelve class in Jordan), the researcher used the analysis comparative tables. The results of the current study concluded that the contents in the sixth scientific biology book in Iraq did not contain a large amount of information and each information was not exposed in detail for students, which leads the students to memorization without going into depth understanding. Increase in the number of content over the number of figures in the genetic chapter. Biology book in Iraq study all living organisms in contrast to the curriculum book in Jordan, which was limited to human only. The presence of questions in the book of biology at the end of each chapter did not note in the biology curriculum in Iraq. The study recommended reducing the vocabulary number of living organisms and increasing the number of photos and figures.
Background: Medicinal plants that possess antimicrobial and antioxidant properties have garnered significant attention for their role in maintaining food quality, improving safety, and impeding spoilage. They also can aid in controlling food contamination risks and augmenting the nutritional value of foods. Objective: The study aimed to obtain botanical extracts possessing antimicrobial capabilities and use them to inhibit the growth of molds and yeasts. Additionally, these extracts are aimed at prolonging product shelf life by harnessing their antioxidant attributes. Methods: Several microorganisms, including E. coli and Pseudomonas, were subjected to testing. Ethanolic alcohol, chloroform, and essential oil extracts were prepared;
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreIn many organizations, employees who have high mental skills are the main source of organizational creativity. When a firm does not put creativity as a goal, cannot stand solid against the competition. Nowadays, knowledge is the path to discover the innovation and creativity aspects, This can assist the firm to stand face to face with competition in the market. The importance of this research comes from detecting and knowing the relation between creativity and knowledge to know and detect the influence of organizational creativity on backing the management of knowledge and determine the final results. The problem of research is to trace the role of organizational creativity on knowledge management processes in order to enable the
... Show MoreThis research focuses on shedding light on the most important criteria by which the translator can achieve total success with regard to the translation of scientific texts whose written language in Spanish is greatly influenced by expressions and words adopted from the English language and other world languages, in addition to exposing the most outstanding difficulties that translators face when translating from Spanish to Arabic, giving the most appropriate solutions in this regard.
Resumen
El presente trabajo de investigación se centra en echar luz sobre los criterios más importantes por los cuales el traductor puede conseguir el total éxito en la traducción de los textos científicos cuyo lenguaje
... Show MoreThis conducted research, (The Scientific Efforts of Ahmed Mustafa Al-Maraghi) deals with Al-Maraghi's life, birth, upbringing, characteristics, title, family and religion secter, as well as his general biography. And his relationship with scholars, his learning and teaching, and the introduction of the Muhammed Abdo School and the College of Dar Al Uloom, and finally the discussion of his scientific, social and political poin of view, as an interpreter of twentieths century, was appointed as the president of Al-Azhar and Ifta during the days of the royal era, and he studied at the College of Dar Al-Uloom
This research aims at identifying the system of applying the QRcode system for acquisition of chemistry by first class female students studying at intermediate schools knowledge and its effect on creative thinking. The research sample consisted of (63) female students in one of the intermediate schools in Baghdad/Iraq using two equivalents experimental and control groups. The scientific context used was based on the chemistry text book related to the periodic table, (Metals) for the first group of students and Alkaline metals,Nonmetals, Metalloides) for the second group. The research methodology employed consisted of the followings :Measuring students acquisition using (35) issues. The results were verified for their face validity and obtai
... Show MorePurpose To test the effect of strategic Supremacy on strategic success A case study in Thi Qar Governorate, methodology/approach – this is a mandatory entry.
a case study was used and applied to the Department managers of Government of the province of Thi Qar, Research limitations/implications – It is clear that the strategic Supremacy variable is not being used effectively to achieve strategic success.
Practical implications – use strategic supremacy positively to Support for strategic success. implementing and monitoring ignorance of them in how to use thi
... Show MoreThe characters of facades' form of the Iraqi building after 2003 have been changed, it has been described by many names. The problem of the research is that what are the features of the characters of the form in the façades of the buildings in Baghdad city after 2003? Are the façade of the individual houses or the commercial buildings is the heaviest in the visual weight? The research aims to answer those questions by choosing the vernacular architecture as a measurement tool. It is the informal image of the architecture, which is built by people informally and spontaneously, without official control and legislation to be organized. This is smellier to what has happened in Baghdad, after 2003 according to previous stud
... Show MoreThe lesser grain boner Rhizopertha dominica is an important insect on grain in Iraq . in this study phenol and coumarin were isolated from Albizzia lebbek . the addition of there compounds to artificial diet at concentration of 3.4,5% couse high effects on the development of the studed insect larva.the larva were unable to complete its development to adult stage. More over, using 5% coumarin larva were died.Seed germination was not affected when seed were sprayed with concentration of 3,4,5% of coumarin and phenol.
Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show More