Preferred Language
Articles
/
jperc-460
Impulsive behavior among Kindergarten children and its relation ship with some variables preparation
...Show More Authors

Quite anumber of parents and educators of this behavior,which is characterized by exaggerating locomotor activity and impulsivity and recklessness and the difficulty of continuing the status of certain bodily more than one minute ,and the difficulty of waiting to meet aparticular need or desire,it also characterized by thos meddling children the affairs of others and increased their  chatter does not seem the case when you listen to talk to them and they characterized by  weak self-confidence and are more solid and seem un able to keep ther responses because of the severity of anxiety .The research aims to know impulsive behavior among kindergartens children and its relation ship with some variables, and the sample consisted of 400 child from kindergartens in the city of Baghdad in both of (Karkh and Rusafa) The research also Checks the  psychometric standard properties of the scale  honesty , fortitude and honesty was verified in two ways honesty and sincerity of virtual construction , extraction was consistency in two ways retesting and Alnakronbach . And The research found the following results

1-The emergence   of implusive behavior in  children of the age of stag (6-4years).        

  1. There are no statistically significant differences in impulsive behavior among children variable(4-5)(5-6)years.
  2. There are statistically significant differences in impulsive behavior among kindergartens children by variable and in favor of the male sex.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Al-Hafizh Abdan al-Ahwazi, 306 And his modern efforts
...Show More Authors

Abadan, one of the modernists, is the critics, whose words depend on the wound, the modification and the ills of the hadeeth.
He lived Abadan, age in the request to talk and take the elders, and Awali, and attribution, which affected him by taking, and update about (300) Sheikh or more.
Abadan also excelled in the novel and its origins, which made students talk to him, and ask for the novel, with his hardness and hardship. As we will see in the folds of the search

View Publication Preview PDF
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
On Strongly F – Regular Modules and Strongly Pure Intersection Property
...Show More Authors

A submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .

View Publication Preview PDF
Crossref
Publication Date
Sun Jul 17 2022
Journal Name
Pharmacy Education
Students' experience and evaluation of community pharmacy internship in Iraq
...Show More Authors

Background: Pharmacy internship programmes are driven by most developed countries to outweigh the ongoing growth in the pharmacy career which encourages pharmacists to play a significant role as healthcare providers.    Objectives: This study examines pharmacy students' perception, satisfaction, challenges, and limitations with the internship curriculum.    Method: A cross-sectional study was conducted using an online survey with different elements to examine students' perceptions of various aspects.    Result: Most students reported a positive impression regarding their internships, however, they were less satisfied with the allowance for filling prescriptions and compounding also, the college's follow-up was inadequate. F

... Show More
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue May 01 2012
Journal Name
First Eage Workshop On Iraq - Hydrocarbon Exploration And Field Development
Microfacies and Petrographic study for Yamama formation in Ratawi field
...Show More Authors

View Publication
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Sun Apr 02 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Phosphodiester Conjugation of Metronidazole and Dexamethasone as Possible Mutual Prodrug
...Show More Authors

As possible mutual prodrug had been synthesized that contain metronidazole and dexamethazone conjugated through phosphodiester linkage. The rationale for this type of conjugate is to get a prodrug with possible site – specific delivery of its active constituents into the lower parts of the G.I.T.

This compound was synthesized by the reaction of dexamethzone – 21 – phosphate with metronidazole to form:(1 – (dexamethazone – 21 – phosphoryl) – metronidazole)

   This conjugate was performed using dicyclohexylcarbodiimide (DCC) as a condensing agent. The identity of the prepared compound had been confirmed using T.L.C., U.V. spectroscopy, IR spectrosco

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 24 2019
Journal Name
Journal Of Education College Wasit University
Postmodernism and Technology in Don Delillo's Novel The White Noise
...Show More Authors

This paper aims at investigating the effect of postmodernism and technology on the social life in Don Delillo's novel The White Noise. In this novel, Don Delillo portrays the chaotic life by using modern technology which has been presented by three ways. The first way is by television as being a source of information and entertainment. The second way is by the toxic event whereas the third is by Dylar's episode and its destructive consequences. He depicts that through the atmosphere of Jack's family plus its effects on the life and thoughts of the elders and society. He proves that technology is leading humanity not to safety, but to death. He further highlights that by showing the impact of technology on the life of the main charac

... Show More
View Publication
Crossref
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Journal Of Engineering
Buckling Loads and Effective Length Factor for Non-Prismatic Columns
...Show More Authors