The study seeks to examine the level of personal efficacy and its relation to mental alertness among university students. Besides, the statistically significant differences in regard of students' gender, and the correlation between male and female. To do this, the researcher adopted two scales: one to measure the personal efficacy which was made up by (abed al-jabaar, 2010) included (26) items, and the other to measure the mental alertness that designed by (abed Allah, 2012) included (36) items. A total of (120) student were selected randomly from three-different colleges at the Al-Mustansiriyah University for the academic year 2016-2017. The findings revealed there are no significant differences among students in regard of the personal efficacy and mental alertness they lack to personal efficacy, students show a high level of mental alertness, and finally, there is no correlation between personal efficacy and mental alertness.
The influence of silver doped n-type polycrystalline CdTe film with thickness of 200 nm and rate deposition of 0.3 nm.s -1 prepared under high vacuum using thermal co-evaporation technique on its some structural and electrical properties was reported. The X- ray analysis showed that all samples are polycrystalline and have the cubic zinc blend structure with preferential orientation in the [111] direction. Films doping with impurity percentages (2, 3, and 4) %Ag lead to a significant increase in the carrier concentration, so it is found to change from 23.493 108 cm -3 to 59.297 108 cm -3 for pure and doped CdTe thin films with 4%Ag respectively. But films doping with impurity percentages above lead to a significant decrease in the electrica
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThe wall of the esophagus in Mabuya aurata septemaeniata as in high vertebrates consists of four layers, mucosa, submucosa,muscularis and serosa. Mucosa forms many unorganized short and long folds penetrate inside the esophageal cavity. Mucosa contains two sub layers, first one is lining epithelium which includes two types of cells, simple ciliated columnar epithelial cells and goblet cells, second one is lamina properia. Mucosa does not have muscularis mucosa. There is no esophageal glands within esophagus. Many special stains were used as (Periodic Acid Schiff (PAS)) to detect Carbohydrates in goblet cells. Alcian blue were used to detect the amount of goblet cells within lining epithelium. Alcian blue + PAS together confirm that the
... Show MoreIdioms are a very important part of the English language: you are told that if you want to go far (succeed) you should pull your socks up (make a serious effort to improve your behaviour, the quality of your work, etc.) and use your grey matter (brain).1 Learning and translating idioms have always been very difficult for foreign language learners. The present paper explores some of the reasons why English idiomatic expressions are difficult to learn and translate. It is not the aim of this paper to attempt a comprehensive survey of the vast amount of material that has appeared on idioms in Adams and Kuder (1984), Alexander (1984), Dixon (1983), Kirkpatrick (2001), Langlotz (2006), McCarthy and O'Dell (2002), and Wray (2002), among others
... Show MoreAbadan, one of the modernists, is the critics, whose words depend on the wound, the modification and the ills of the hadeeth.
He lived Abadan, age in the request to talk and take the elders, and Awali, and attribution, which affected him by taking, and update about (300) Sheikh or more.
Abadan also excelled in the novel and its origins, which made students talk to him, and ask for the novel, with his hardness and hardship. As we will see in the folds of the search
A submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More