The aim of the present study is to identify the level of prosoical behavior of Baghdad University's students and to recognize the differences between male and female students. Moreover, it also aims to identify the level of openness to experience for these students. A random sample of (123) students has been selected; 77 males and 46 females. Two scales have been used in the study. The Prosocialness scale for adults by Caprara. Et al (2005) has been translated into the Arabic language and relies on four types of actions (Helping, Sharing, Taking care, and feeling Empathetic with others) and the other scale is the Openness to Experience Scale, which is one of the Big Five Inventory by John and Srivastava (1999). The main results showed a high level of prosaically behavior among the study sample and there are no significant differences in terms of prosaically behavior between males and females. The study also found that the level of openness to experience is high with a positive correlation between prosocial behavior and openness to experience among university students
The Arabic Grammar between Originality and Sufficiency
Many of the signs that the global energy system indicate the start of a period of transition from total dependence on fossil energy sources, especially oil, into a new era in which alternative energy sources play an important role in meeting the growing needs of energy demand, so sought many of the developed countries through research the studies carried out to try to bring renewable energy sources and non-renewable (shale oil, oil sands, solar energy, wind energy .... etc) replace traditional fossil energy sources (oil, gas, coal) and despite the recent availability dramatically and spread throughout the the world, but they are going to dry up in the foreseeable future. So many countries, especially the developed sought to find
... Show MoreThis study is conducted to carry out a straightforward way appropriate for quality monitoring and stability of arc stud welding process, followed by a number of procedures to control the quality of welded samples, namely torque destructive testing and visual inspection context. Those procedures were being performed to support the monitoring system and verify its validity. Thus, continuous on-line monitoring guarantees earlier discovering stud welding defects and avoiding weld repeatability. On-line welding electronic monitoring system is for non destructive determining if a just completed weld is satisfactory or unsatisfactory, depending on welding current peak value detected by the system. Also, it has been observed significant ha
... Show MoreThe Moslem women between west and Islam ,This study deals with Muslim women
from the west Pont of view in the oriental studies or the western media and how it was
exposed to ill-treatment or evil-eyed by the west due to misunderstanding or it was done on
purpose that they didn’t comprehend how the women deals with Islam ,so this western view
assured that Islam had disparaged the women's position and hindered her freedom, aiming at
stabbing Islam and dislocate the Islamic tissue which is formed from man and women.
This study has established with evidences the distance of this western view from reality
Islam in fact raised and lifted women's position while the western women was living on
the margin of life, robbed
Plagiarism Detection Systems play an important role in revealing instances of a plagiarism act, especially in the educational sector with scientific documents and papers. The idea of plagiarism is that when any content is copied without permission or citation from the author. To detect such activities, it is necessary to have extensive information about plagiarism forms and classes. Thanks to the developed tools and methods it is possible to reveal many types of plagiarism. The development of the Information and Communication Technologies (ICT) and the availability of the online scientific documents lead to the ease of access to these documents. With the availability of many software text editors, plagiarism detections becomes a critical
... Show MoreUrban morphological approach (concepts and practices) plays a significant role in forming our cities not only in terms of theoretical perspective but also in how to practice and experience the urban form structures over time. Urban morphology has been focused on studying the processes of formation and transformation of urban form based on its historical development. The main purpose of this study is to explore and describe the existing literature of this approach and thus aiming to summarize the most important studies that put into understanding the city form. In this regard, there were three schools of urban morphological studies, namely: the British, the Italian, and the French School. A reflective comparison between t
... Show MoreAbstract
The Research "Surah At-Talaq between Commentators and Jurists" is summarized in the objectives of the Surah, clarifying the meanings of the verses of the rulings contained therein by mentioning the statements of the commentators, with mentioning the most acceptable of those meanings when a difference arises, explanation of the provisions of the Surah, with a statement of sayings of the four religious schools of Islamic jurisprudence, in summary, due to the narrowness of the place, and the most acceptable of them.
The research addresses (9) topics, which are: the objectives of Surah At-Talaq, prohibition of divorce during menstruation, testifying retract and divorce, irrevocably divo
... Show MoreIn this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreAn indoor spraying robot is built in this research to solve numerous challenges associated with manual spraying. The mechanical, hardware and essential technologies used are all detailed and designed. The proposed spraying robot's conceptual design is split into two parts: hardware and software. The mechanical design, manufacturing, electrical, and electronics systems are described in the hardware part, while the control of the robot is described in the software section. This robot's kinematic and dynamic models were developed using three links that move in the x, y, and z directions. The robot was then designed using SolidWorks software to compute each connection's deflection and maximum stresses. The characteristics of the stepper moto
... Show More