Effect of Using Computer in Getting and Remaining Information at Students of First Stage in Biology Subject MIAAD NATHIM RASHEED LECTURER Abstract The recent research goal is to know the influence of computer use to earn and fulfillment information for students of first class in biology material and to achieve that put many of the zeroing hypothesis by researcher as follow: There were no differences between statistical signs at level (0,05) between the average students' marks who they were study by using computer and between the average student ' marks who they were study in classical method of earning and fulfillment. The researcher chose the intentional of the medical technical institute that included of two branches the first class (A) for experimental group and branch (B) for controlled group as realty of (60) students (females and males) in every branches and because I was as statistics so the differentiate between explanation students' research group in use of the researcher limit scientific material of (third unit for biology material), researcher has modeled statistical test consists of (50) clauses from multi selection type showed for specialized group of test adding to know the distinguish between every clauses by using the half portion method and upon the contrast coefficient that among of (84.0) and after the finish of applied experiment of statistical test by using the dual independent samples test. And the obtained results, researcher concluded the use of computer as motivation for the students to do homework of the teaching biology material and she suggested to do their studies in another variables of non earing and fulfillment.
Background: Prolapsed intervertebral disc is an important and common cause of low backache. MRI has now become universally accepted investigation for prolapsed intervertebral disc. We, however, regularly come across situations, when MRI shows diffuse disc bulges, even at multiple levels, which cannot be correlated clinically and when such cases are operated, no significant disc prolapse is found resulting in negative exploration.Objective: To evaluate the role of M.R.I. finding not only for diagnosis of disc herniation at lumbar region but also for localization the level of herniationMethods: A prospective study on seventy five symptomatic low backache and MRI confirmed prolapsed intervertebral disc patients at lumbo-sacral region were o
... Show MoreThis paper aims to identify the approaches used in assessment the credit applications by Iraqi banks, as well as which approach is most used. It also attempted to link these approaches with reduction of credit default and banks’ efficiency particularly for the Gulf Commercial Bank. The paper found that the Gulf Bank widely relies on the method of Judgment Approach for assessment the credit applications in order to select the best of them with low risk of default. In addition, the paper found that the method of Judgment Approach was very important for the Gulf Bank and it driven in reduction the ratio of credit default as percentage of total credit. However, it is important to say that the adoption of statistical approaches for
... Show MoreThis study presents the effect of laser energy on burning loss of magnesium from the holes' drilled in aluminum alloy 5052. High energy free running pulsed Nd:Glass laser of 300 µs pulse duration has been used to perform the experiments. The laser energy was varied from 1.0 to 8.0 Joules, The drilling processes have been carried out under atmospheric pressure and vacuum inside a specially designed chamber. Microhardness of the blind drilled holes has been investigated .The results indicated that the magnesium loss could be manipulated by adjusting the focusing conditions of the laser beam. Almost, the obtained holes were free of cracks with low taper and low sputter deposition. .The holes performed under atmospheric conditions have high
... Show MoreAbstract
The study aims to build a training program based on the Connectivism Theory to develop e-learning competencies for Islamic education teachers in the Governorate of Dhofar, as well as to identify its effectiveness. The study sample consisted of (30) Islamic education teachers to implement the training program, they were randomly selected. The study used the descriptive approach to determine the electronic competencies and build the training program, and the quasi-experimental approach to determine the effectiveness of the program. The study tools were the cognitive achievement test and the observation card, which were applied before and after. The study found that the effectiveness of the training program
... Show Moreاستهدفت الدراسة الحالية تحديد طبيعة العلاقة الارتباطية بين التعاطف والسلوك العدواني لدى عينة من طلبة المرحلة المتوسطة. تكونت العينة من طلبة الصف الأول المتوسط بغداد/ تربية الرصافة الثانية من كلا الجنسين، شملت 218 طالباً وطالبة، وطبق مقياس التعاطف، ومقياس السلوك العدواني. وبعد معالجة البيانات، أظهرت النتائج تمتع طلبة الصف الأول المتوسط بالنزعة أو الميل للتعاطف، وتبين أن الإناث أكثر تعاطفاً من الذكور، ومستوى
... Show MoreThe bubble columns are widely used as a two or three phase reactor in industrial chemical process such as absorption, biochemical reactions, coal liquefaction, etc. To design such a column, two main parameters should be taken in consideration, the gas hold-up (), and the liquid phase mass transfer coefficient KLa. The study includes the effect of gas velocity and the addition of alcohols on gas hold-up and mass transfer coefficient in bubble column with draught tube when the length of the column is 1.5m and the ratio of the draught tube diameter to the column diameter equals 0.5 and the air dispersion into the base of the draught tube using a multi hole tuyere is equivalent to a diameter of 0.15 mm and
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show More