The purpose of the study is to identify the teaching techniques that mathematics' teachers use due to the Brain-based learning theory. The sample is composed of (90) teacher: (50) male, (40) female. The results have shown no significant differences between male and female responses' mean. Additionally, through the observation of author, he found a lack of using Brain-based learning techniques. Thus, the researcher recommend that it is necessary to involve teachers in remedial courses to enhance their ability to create a classroom that raise up brain-based learning skills.
Artificial fish swarm algorithm (AFSA) is one of the critical swarm intelligent algorithms. In this
paper, the authors decide to enhance AFSA via diversity operators (AFSA-DO). The diversity operators will
be producing more diverse solutions for AFSA to obtain reasonable resolutions. AFSA-DO has been used to
solve flexible job shop scheduling problems (FJSSP). However, the FJSSP is a significant problem in the
domain of optimization and operation research. Several research papers dealt with methods of solving this
issue, including forms of intelligence of the swarms. In this paper, a set of FJSSP target samples are tested
employing the improved algorithm to confirm its effectiveness and evaluate its ex
Objective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have uniqu
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreThe research aims to identify ways of upgrading the quality level of university education at the Middle Technical University in light of its application for the National Ranking project for the quality of Iraqi universities in order to obtain advanced grades among the Iraqi universities , Which is qualified to enter the Ranking of universities worldwide, through displaying the mechanism of the Application of National Ranking project for the quality of Iraqi universities in the Middle Technical University and its formations consisting of (5) technical colleges and (11) technical institute.
The results of the application showed several observations: The most
... Show MoreA CRITICAL OVERVIEW IN SELECTED POEMS
Checkpoint inhibitors are a type of immune therapy used to treat different types of cancers. These drugs block different checkpoint proteins, for example, CTLA-4, PD-1, and PD-L1 inhibitors.
They block proteins that stop the immune system from attacking the cancer cells. Checkpoints are also described as a type of monoclonal antibody that antagonizes binding between B7 to CTLA-4 and PD-L1 to PD-1.
Immune checkpoint inhibitors are used to treat BARCA mutated triple-negative breast cancer (TNBCS) in patients who do not respond to chemotherapy, and also in the treatment of highly mutated and solid tumors such as brain tumors, liver, and pancreatic cancers.
Immune checkpoint inhibitors exhibit an effect on solid tumo
... Show MoreObjective(s): To evaluate nurses' practices who work in respiratory intensive care units to control the
complications of patients admitted at this unit and determine the relationship between nurses' sociodemographic
characteristics and their practices.
Methodology: A descriptive study was carried out at Respiratory Care Unit at Baghdad teaching hospitals that
started from February 22th, 2013 to August 30th, 2013. A purposive "non-probability" sample of (70) nurses who
work in Respiratory Care Unit was selected from Baghdad teaching hospitals. The data were collected through the
use of constructed questionnaire that consists of two parts; (l) Demographic data form that consists of 7items and
(2) nurses' practice form
The problem of the current research addressed the close link between the psychological stress and social isolation as behavior and experience, as well as, the stress of the displaced pupils by the sense of alienation and isolation from the society to which they had moved. It reflects a sense of mystery to the displaced pupils about their lives in the present and future. Therefore, the current research aims to identify the psychological presence and the level of social isolation among secondary school displaced pupils and identify whether there were statistically significant differences in the variables between the displaced pupils (males-females). Moreover, it attempts to identify the relationship between psychological stress and social
... Show More