This research aims to investigate the impact of a training program for teachers of chemistry according to the strategies for both sides of the brain together in academic achievement for their students, the sample consisted of a 12 teachers of both genders who are teaching chemistry for the students of the fifth scientific secondary schools of the General Directorate for the Education in Garmiyan/Sulaymaniyah governorate, Iraqi Kurdistan region, where five teachers of them randomly selected to involve the training program, and seven teachers did not participate in the proposed training program, where a sample of students was selected for each group of teachers about 147 male and female students for teachers of the experimental group and 198 male and female students for teachers of the control group. After the preparation of the training program, its prepared research instrument was a learning test of the multiple choice in chemistry for the reliability of (0. 91) depending on the equation of Kuder-Richardson-20, the results showed the impact of the training program on the academic achievement between the two groups of students in the research sample for the group of the trained teachers in training program with a size of significant impact in compare with the students of non training teachers.
One of the most important problems in tablet process is to control the flow of the catalyst through the hopper; Controlling the flow can be done either by changing the size of particles or added the different lubricant (stearic acid, starch, graphite) or blending of different lubricants. The study showed that we can control (increase or decrease) on the flow of the catalyst through the hopper by blending different lubricants for the constant percentage. The flow increasing when particles size (0.6 mm) and then decrease with or without lubricants, no effect on flow when particles size lower than (0.2 mm) with use that lubricants, and good flow on (0.4 mm) when use stearic acid and starch.
The contemporary art culture is considered a resultant of preceding human civilizations from the early days. At the same time, it got closer to the local privacy, because the contemporary Iraqi potter worked hard to create new art, refusing to base his art on the early works, creating art pieces that contains properties to inherited art and their form significance, in order to create a new identity of his own, bringing an empowerment to his deepened civilization, with the goal to create national identity ideas from one hand, and entity and locality from another. Europeans also followed the direction of our civilization, such as (Picasso, Henry Moore, Barbra Hurth, Brankouzi, Hans Arp,..etc). From this point of view comes the importance o
... Show MoreAbstract: Objectives: To investigate the effect of temperature elevation on the bonding strength of resin cement to the zirconia ceramic using fractional CO2 laser. Background: Fractional CO2 laser is an effective surface treatment of zirconia ceramic, as it increases the bonding strength of zirconia to resin cement. Methods: Thirty sintered zirconia discs (10 mm diameter, 2 mm thickness) were prepared and divided to three groups (N=10) and five diffident pulse durations were used in each group (0.1, 0.5, 1, 5 and 10 ms). Group A was treated with 10 W power setting, group B with 20 W and group C with 30 W. During laser irradiation, temperature elevation measurement was recorded for each specimen. Luting cement was bonded to the treated z
... Show MoreIn today's world the role of leadership in the control factors of the organization different and advancement, and that the possession of the human ability to the development and creation and innovation varies from one individual to another depending on experience; and levels of performance and intellectual; and his mental and physical and other such factors can create a kind of differentiation between the built humans, and this distinction creates our leaders are able to influence others and have the wisdom and connect active individuals and organizations. as the need for organizations of all sizes and levels of leadership transformation is an urgent need to link the application of the various plans and strategies device which direction
... Show MoreAbstract
This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an
... Show More
Abstract: Narrow laser pulses have been essential sources in optical communication system. High data rate optical communication network system demands compressed laser source with unique optical property. In this work using pulsed duration (9) ns, peak power 1.2297mW, full width half maximum (FWHM) 286 pm, and wavelength center 1546.7 nm as compression laser source. Mach Zehnder interferometer (MZI) is built by considering two ways. First, polarization maintaining fiber (PMF) with 10 cm length is used to connect between laser source and fiber brag grating analysis (FBGA). Second, Nested Mach Zehnder interferometer (NMZI) was designed by using three PMFs with 10 cm length. These three Fibers are splicing to sing
... Show MoreThe financial statements must accurately, clearly and fairly present the financial situation and financial statements should be reliable as well. Pursuant to Board Decision No. (74) 2020, CBI obliges banks, according to the Banking Law No. (94) for the year 2004, Article (33) paragraph 2 concerning real estate owned from previous years and expropriated as a result debt settlement , to apply a real estate liquidation provision at a rate of 20% for each property expropriated and at a rate of 100% for each year of delay up to (5) years .also from the significance of the issue of real estates that become a property of banks as a result of debt settlement and the pr
... Show MoreThe present study includes the effect of the ethanolic and aqueous extract of Piper nigrum against the third instar of Culex pipiens molestus (Diptera:Culicidae) in different concentrations: 1, 1.5 ppm of ethanolic extracts of Piper nigrum causing 100% mortality of larvae in the second day of treatment, while the concentrations 5% of aqueous extracts of Piper nigrum caused 100% mortality of larvae in the second day of treatment. The concentration 2.5% caused 100% mortality of larvae after four days of treatment. The current study also detected the effect of 0.1% concentration of Piper nigrum aqueous extract. The effect of this concentratio
... Show MoreBobbin friction stir welding (BFSW) is a variant of the conventional friction stir welding (CFSW); it can weld the upper and lower surface of the work-piece in the same pass. This technique involves the bonding of materials without melting. In this work, the influence of tool design on the mechanical properties of welding joints of 6061-T6 aluminum alloy with 6.25 mm thickness produced by FSW bobbin tools was investigated and the best bobbin tool design was determined. Five different probe shapes (threaded straight cylindrical, straight cylindrical with 3 flat surfaces, straight cylindrical with 4 flat surfaces, threaded straight cylindrical with 3 flat surface and threaded straight cylindrical with 4 flat surfaces) with various dimensio
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show More