Preferred Language
Articles
/
jperc-379
The role of teachers in Sociology In the development of creative thinking for students stage Middle school section of the literary In Karkh II schools From the perspective of the teachers and the students themselves
...Show More Authors

This study aimed identify the teachers of sociology. In the development of creative thinking. I have students in middle school .llvra literary. In schools. Second Karkh From the perspective of the teachers and the students themselves  numbered (41), a teacher and a school. As The study population   encompassed of some students the fourth and fifth preparatory stage in the Karkh II schools, totaling 200 male and female students. As the study sample were consisted of (7) and a teacher (34) and accented (85) of male students (115) were female student The researcher the questionnaire which consisted of (39) items And to achieve the objectives of the study it was ascertained sincerity And stability. And a workout the questionnaire on a sample of (20) a teacher Were analyzed using the kronbach Alpha correlation factor resulting rating of (92.5%)

Results showed as follows:

  1. The teachers and their role in the development of estimates of creative thinking of students Karkh II schools for Everybody scale .The a highly With the exception of clause (6), which was intermediate And the role of teachers in sociology. In the development of creative thinking from the perspective of students. Medium degree
  2. not find statistically significant differences in the response of teachers on the role of teachers In the development of creative thinking of the request According to the study variables While the pointed to find statistically significant differences in the response of students Halldor teachers in the development of creative thinking Among students by sex change in favor of females

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Silica Fume Modified Cement-Based Mortar Exposed to High Temperatures: Residual Strengths and Microstructure
...Show More Authors

Several previous investigations and studies utilized silica fume (SF) or (micro silica) particles as supplementary cementitious material added as a substitute to cement-based mortars and their effect on the overall properties, especially on physical properties, strength properties, and mechanical properties. This study investigated the impact of the inclusion of silica fume (SF) particles on the residual compressive strengths and microstructure properties of cement-based mortars exposed to severe conditions of elevated temperatures. The prepared specimens were tested and subjected to 25, 250, 450, 600, and 900 °C. Their residual compressive strengths and microstructure were evaluated and compared with control samples (C

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Dec 25 2009
Journal Name
Wireless Personal Communications
A N-Radon Based OFDM Trasceivers Design and Performance Simulation Over Different Channel Models
...Show More Authors

In this paper a new method is proposed to perform the N-Radon orthogonal frequency division multiplexing (OFDM), which are equivalent to 4-quadrature amplitude modulation (QAM), 16-QAM, 64-QAM, 256-QAM, ... etc. in spectral efficiency. This non conventional method is proposed in order to reduce the constellation energy and increase spectral efficiency. The proposed method gives a significant improvement in Bit Error Rate performance, and keeps bandwidth efficiency and spectrum shape as good as conventional Fast Fourier Transform based OFDM. The new structure was tested and compared with conventional OFDM for Additive White Gaussian Noise, flat, and multi-path selective fading channels. Simulation tests were generated for different channels

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Al-khwarizmi Engineering Journal
Citric Acid Production: Raw Material, Microbial Production, Fermentation Strategy and Global Market: Critical Review
...Show More Authors

Citric acid is an essential ingredient for the manufacture of (12) key industrial chemicals. Citric acid use is increasing steadily with a high annual growth rate as a result of the development of ever more sophisticated applications. Citric acid is widely utilized in the food and pharmaceutical industries due to its low toxicity when compared to other acidulous. Other uses for citric acid can be found in cleaning supplies and detergents. Based on information from a review of the literature, Citric acid production substrates and methods for surface fermentation, submerged fermentation, solid-state fermentation, and international market expansion are all covered in the current review study. Finally, there is still much to learn about the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Feb 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Hybrid Algorithm to Protect Computer Networks Based on Human Biometrics and Computer Attributes
...Show More Authors

Objective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have uniqu

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 19 2014
Journal Name
Journal Of Biosciences
Caspase-like proteins: Acanthamoeba castellanii metacaspase and Dictyostelium discoideum paracaspase, what are their functions?
...Show More Authors

View Publication
Scopus (8)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Political Sciences Journal
American Presidential Elections- Mechanism and campaign Issues with special reference to 2008-2012 elections
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 05 2017
Journal Name
Baghdad Science Journal
Cache Coherence Protocol Design and Simulation Using IES (Invalid Exclusive read/write Shared) State
...Show More Authors

To improve the efficiency of a processor in recent multiprocessor systems to deal with data, cache memories are used to access data instead of main memory which reduces the latency of delay time. In such systems, when installing different caches in different processors in shared memory architecture, the difficulties appear when there is a need to maintain consistency between the cache memories of different processors. So, cache coherency protocol is very important in such kinds of system. MSI, MESI, MOSI, MOESI, etc. are the famous protocols to solve cache coherency problem. We have proposed in this research integrating two states of MESI's cache coherence protocol which are Exclusive and Modified, which responds to a request from reading

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Apr 11 2024
Journal Name
Russian Journal Of Infection And Immunity
MATRIX METALLOPROTEINASES -3 (MMP-3) SERUM LEVEL AND GENETIC POLYMORPHISMS ASSOCIATED WITH RHEUMATOID ARTHRITIS
...Show More Authors

Abstract Introduction: MMP3 plays a crucial role in the process of bone erosion in the pathomechanism of rheumatoid arthritis (RA). It acts by removing the outer osteoid layer, which allows the osteoclasts to tightly connect and carry out the subsequent damage to the underlying bone. MMP3 can trigger the production of other MMPs like MMP-1, MMP-7, and MMP-9, it plays a pivotal role in the remodeling of connective tissues. Aim of the study: to assess the influence of MMP-3 serum levels and single-nucleotide polymorphisms of rs679620 in the rheumatoid arthritis patients' group in comparison to the control group. Subjects: eighty eight samples, 45 rheumatoid arthritis patients after being referred by their treating physician for regular RA

... Show More
View Publication
Publication Date
Tue Jun 01 2021
Journal Name
Bulletin Of Electrical Engineering And Informatics
A new pseudorandom bits generator based on a 2D-chaotic system and diffusion property
...Show More Authors

A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist

... Show More
View Publication
Scopus (12)
Crossref (6)
Scopus Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Crossref