Preferred Language
Articles
/
jperc-1398
The Psychological Security of Students in the Kindergarten Department
...Show More Authors

Abstract

The current research aims to identify the psychological security of students in the kindergarten department and identify if there is a significant difference between stage one and stage four students. To do this, the researcher adopted the psychological research scale of (Al-mohamdawi, 2007) that consisted of (30) items. It was administered to (120) female students chosen randomly from the kindergarten department in the college of education for women for the academic year (2029-2021). The results revealed that students in the kindergarten department have psychological security. There is a significant difference between stage one and four students in favor of stage four students.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
The effectiveness of internal rhythm in the poetry of Ridicule with Ibin Bassam al-Bagdadi
...Show More Authors

This study seeks to uncover the aesthetics of the internal rhythm and its effectiveness in
enriching the poetic text with the music tone at represented in the art of repetition and the
permit and recycling division and put back on the chest and the naturalization interview and
counterpoint.
And try to stand on the impact of internal rhythm to highlight the meaning of spelling and
irony with poet Ibn Bassam Al-Bagdadi and have a close look at the literary and
psychological motivations that led the poet to employ these colors in his ridicule and the
extent of its contribution to intensify the poetic alphabetic flush.
And deepening the meanings and provide poetic text in different aesthetics, there is no doubt
tha

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 07 2013
Journal Name
Journal Of Educational And Psychological Researches
Vocational stresses and their relation with the level of ambition among the lecturers of the university
...Show More Authors

Vocational stresses and their relation with the level of ambition among the lecturers of the university In general , vocational stresses affect the attention and the process of focusing making individual busy with solving of his daily problems instead of his job. The vocational stresses , anxiety and tension are factors effecting the physical and psychological ability of the individual. This study aims to measure the vocational stresses among the lecturers of the university , to measure the level of ambition among them, to identify the statistical differences significant among them according to sex variable, to identify the differences significant in level of ambition among them according to sex variable and to identify the correlation r

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Al–bahith Al–a'alami
The Influence of Turkish Soap Operas in the Behavior and Trends of the Iraqi Audience (A Field Study on Iraqi University's Students)
...Show More Authors

This research seeks the effects of dubbed Turkish TV series on Iraqi audiences. The chosen sample is about 600 Iraqi students at Baghdad and al-Anbar Universities. This study consists of four sections: section one deals with the theoretical framework of the study. Section two studies the dubbed Turkish TV series. The third section explores the role of mass media in forming tendencies, and the last section seeks the field study by analyzing the tendencies if Iraqi viewers of these series.
The goal of this study is to know the role these series played in affecting the behavior and attitudes of Iraqi people and how it can change their morals.
The research ends with the number of results like the negative effect of these series on the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
The impact of learning strategies in the collection of biology and their systemic thinking
...Show More Authors

Research Summary The aim of the search for knowledge of the effect generative learning strategy in: 1 - Achievement of the second grade. 2 - Systemic thinking for the second grade students when studying the biology. The study sample increased (60) students distributed into two equal experimental and control groups. Prepare the test of 40 pieces of multiple choice type and prepare a test for systematic thinking according to three skills 1. Understand the relationships between the parts of the systemic form and complement the sentences given 2 - complement the relationships between parts of the systemic form 3. Building the systemic form. It was a search result 1- There is a difference of statistical significance (at level 0.05) between th

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 18 2019
Journal Name
Al-kindy College Medical Journal
Association Between Different Risk Factors And Stroke At Emergency Department In Neuro Science Hospital
...Show More Authors

Background: Stroke is an acute neurologic injury and represents the 2nd leading cause of mortality worldwide, and also the most leading cause of acquired disability and morbidity in adults.

Objective: Effect and association between stroke and risk factors.

Type of the study: A retrospective study.

Methods: The study conducted on 312 patients in 2016, all data were collected from patients’ files from the emergency unit, which included basic demographic and disease characteristic, co morbid diseases, risk factors, final diagnosis.

Results: both previous stroke, ischemic heart disease was strong predictor of new

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 14 2018
Journal Name
International Journal Of Science And Research (ijsr)
Effect of the Active Thinking Model in the Achievement of Students of the Fifth Grade Applied Science of Physics and Their Pivotal Thinking
...Show More Authors

The aim of the current research is to identify the effect of the active thinking model in the achievement of students of the fifth grade applied science of physics, and their pivotal thinking by verifying the two zero hypotheses, where there is no significant difference at the level of significance (0.05) between the average scores of the experimental group who studied physics using the active thinking model and the average scores of the control group students who studied the same material in the usual way in the achievement test, as well as in the pivotal thinking test. The research sample consisted of (77) students of the applied fifth grade students in two divisions (a) and (b), randomly selected (a) to be the experimental group, and (b)

... Show More
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Educational And Psychological Researches
Perceptual Speed and Its Relation to the Emotional Patterns of University Students: Perceptual Speed and Its Relation to the Emotional Patterns of University Students
...Show More Authors

 

The current research aims to identify the perceptual speed of the university students as well as to identify the differences in the level of perceptual speed for the university students according to the variables of (male, female) specialization (scientific, human) university (Baghdad, Mustansiriya). Additionally, the research aims to identify the prevalence of emotional pattern and to identify the relationship between perceptual speed and the emotional patterns among university students. The researcher designed a questionnaire to measure the Emotional Patterns based on Jerome Freedman perspective. As for perceptual speed, the researcher adopted French, Extrom and Price scale (1963), which was tran

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (12)
Crossref (7)
Scopus Crossref
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref