The research aims to identify the level of functional engagement and hope-based thinking of kindergarten teachers, identify if there is a significant difference in functional engagement and hope-based thinking in terms of specialization and years of service for kindergarten teachers, identify if there is a significant correlation between functional engagement and hope-based thinking of kindergarten teachers. The current research is determined by kindergarten teachers in the Second Rusafa Baghdad Education Directorate for the academic year (2022-2023). In order to achieve the objectives of the research, the researcher prepared a functional engagement scale, which consists of (45) items in three areas: Perceptual and functional engagement consists of (15) items, emotional engagement consists of (17) items, physical or material engagement consists of (13) items. The scale was presented to a group of experts in the field of educational and psychological sciences and the field of kindergartens, and the scale of hope-based thinking designed by Snyder (1991) was adopted. The results showed that the research sample has functional engagement and hope-based thinking at a high level. There is a statistically significant positive correlation between functional engagement and hope-based thinking. There is no significant difference in functional engagement and hope-based thinking in terms of specialization (kindergarten, other specialization). There is a significant difference in functional engagement and hope-based thinking in terms of years at range (1-10) years.
Background: This study aimed to determine whether there is a relationship among the bite force with facial dimensions and dental arches in a sample of Iraqi adults with Class I skeletal and dental relations. Materials and methods: Forty dental students (20 males and 20 females) were selected under certain criteria. For those individuals, dental impressions, frontal facial photographs and maximum bite force at molar and incisor regions were taken. The dental arches widths and facial dimensions were measured using the AutoCAD program 2007, while the bite force was determined using special device. Descriptive statistics for the measured variables were performed and gender difference was determined using independent sample t-test, while the rel
... Show MoreChemotherapy is one of the most efficient methods for treating cancer patients. Chemotherapy aims to eliminate cancer cells as thoroughly as possible. Delivering medications to patients’ bodies through various methods, either oral or intravenous is part of the chemotherapy process. Different cell-kill hypotheses take into account the interactions of the expansion of the tumor volume, external drugs, and the rate of their eradication. For the control of drug usage and tumor volume, a model based smooth super-twisting control (MBSSTC) is proposed in this paper. Firstly, three nonlinear cell-kill mathematical models are considered in this work, including the log-kill, Norton-Simon, and hypotheses subject to parametric uncertainties and exo
... Show MoreKnowledge represents the foundation stone for the work of all organizations, are working who leads the thinking of individuals is the ability that leads to behavior based on rationality, it is the work that creates value to the organization and thus gain access to performance winning where that knowledge is a new type of capital based on the thought and experience and is the so-called intellectual capital, which is renewable and is constantly evolving. The study sought to explain the role of the climax knowledge in achieving the highest levels of performance Organizational and then access to the performance winning in educational organizations the study sample, was found to be a co
... Show MoreThe present study aims to identify the role of behavioral disorders (anxiety disorder, behavior disorder "behavior", confrontation and challenge disorder, aggressive behavior) in predicting bullying patterns (verbal, physical, electronic, school) in a sample of adolescents with autism spectrum disorder. For this purpose, the researcher developed scales to measure the behavioral disorders and the bullying patterns among adolescents with autism spectrum disorder. The researcher adopted the descriptive survey approach. The study sample consists of (80) adolescents with autism spectrum disorder with ages range from (15-19 years) and (45-53 years old) in association with israr association for people with special needs in the northern borders
... Show MoreIn latest decades, genetic methods have developed into a potent tool in a number of life-attaching applications. In research looking at demographic genetic diversity, QTL detection, marker-assisted selection, and food traceability, DNA-based technologies like PCR are being employed more and more. These approaches call for extraction procedures that provide efficient nucleic acid extraction and the elimination of PCR inhibitors. The first and most important stage in molecular biology is the extraction of DNA from cells. For a molecular scientist, the high quality and integrity of the isolated DNA as well as the extraction method's ease of use and affordability are crucial factors. The present study was designed to establish a simple, fast
... Show MoreThe research aimed to identify the effectiveness of instructional design according to whole brain theory of Herman in the achievement of chemistry at the fifth scientific students at a secondary school of the General Directorate for Educational in Diyala / Baladruz in Iraq. The research sample Consisted of (57 student, (29) students as experimental group studied according to instructional design strategies for whole brain theory of Herrmann and (28) a student as a control group studied by the usual way for two semesters, a prepared achievement test as article and objective type of multiple choice, the coefficient stability of alpha-Cronbach equation reached (0.86). The research Results showed the presence of a statistically significant d
... Show MoreThis study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti
... Show MoreA frequently used approach for denoising is the shrinkage of coefficients of the noisy signal representation in a transform domain. This paper proposes an algorithm based on hybrid transform (stationary wavelet transform proceeding by slantlet transform); The slantlet transform is applied to the approximation subband of the stationary wavelet transform. BlockShrink thresholding technique is applied to the hybrid transform coefficients. This technique can decide the optimal block size and thresholding for every wavelet subband by risk estimate (SURE). The proposed algorithm was executed by using MATLAB R2010aminimizing Stein’s unbiased with natural images contaminated by white Gaussian noise. Numerical results show that our algorithm co
... Show MoreDetermining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on
... Show MoreImage recognition is one of the most important applications of information processing, in this paper; a comparison between 3-level techniques based image recognition has been achieved, using discrete wavelet (DWT) and stationary wavelet transforms (SWT), stationary-stationary-stationary (sss), stationary-stationary-wavelet (ssw), stationary-wavelet-stationary (sws), stationary-wavelet-wavelet (sww), wavelet-stationary- stationary (wss), wavelet-stationary-wavelet (wsw), wavelet-wavelet-stationary (wws) and wavelet-wavelet-wavelet (www). A comparison between these techniques has been implemented. according to the peak signal to noise ratio (PSNR), root mean square error (RMSE), compression ratio (CR) and the coding noise e (n) of each third
... Show More