The aim of research is to identify the effect of using Waks strategy upon acquiring the psychological concepts and mind habits for students in the college of education. An experimental design with a partial adjustment of two experimental and control groups as well as a posttest were employed. The researcher divided the study sample into two groups: group one consisted of (38) students to represent the experimental group that was taught according to the waks strategy, and group two consisted of (35) students to represent the control group that was taught according to the traditional method. The sample was chosen based on some variables namely (Intelligence, Prior knowledge). The researcher has designed the research tools as the test of acquisition of psychological concepts, and mind habits scale, which were proved their validity and reliability. The results showed a superiority of the experimental group in the acquisition of Psychological Concepts.
In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreThis work implements an Electroencephalogram (EEG) signal classifier. The implemented method uses Orthogonal Polynomials (OP) to convert the EEG signal samples to moments. A Sparse Filter (SF) reduces the number of converted moments to increase the classification accuracy. A Support Vector Machine (SVM) is used to classify the reduced moments between two classes. The proposed method’s performance is tested and compared with two methods by using two datasets. The datasets are divided into 80% for training and 20% for testing, with 5 -fold used for cross-validation. The results show that this method overcomes the accuracy of other methods. The proposed method’s best accuracy is 95.6% and 99.5%, respectively. Finally, from the results, it
... Show MoreBackground: Various studies conducted in many parts of the world suggest that there is lack of public awareness and knowledge of various aspects related to diabetes. With proper education, awareness, earlier detection and better care, many complications and co-morbidities can be reduced in diabetic population.Objectives: to evaluate the level of awareness of diabetes mellitus type 2 patients regarding their disease and its' complications.Methods: Cross – sectional survey was conducted during November and December 2011, in the Medical centers of Al Baladiat, Mustansyria and Zuafranya, including 145 type 2 diabetic patients (58.6 % males, 41.4% females) who were subjected to self–structured questionnaires regarding different aspects of
... Show MoreThe current study was designed to explore the association between the pigments production and biofilm construction in local Pseudomonas aeruginosa isolates. Out of 143 patients suffering from burns, urinary tract infections (UTI), respiratory tract infections and cystic fibrosis obtained from previous study by Mahmood (2015), twenty two isolates (15.38%) were identified from (11) hospitals in Iraq, splitted into three provinces, Baghdad, Al-Anbar and Karbala for the duration of June 2017 to April 2018. Characterization was carried out by using microscopical, morphological and biochemical methods which showed that all these isolates belong to P. aeruginosa. Screening of biofilm production isolates was carried out by usi
... Show MoreDeep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to
... Show MoreElevated C-Reactive Protein (CRP) level in serum is a risk factor for type 2 diabetes ,this relationship is likely to be the cause it means elevated CRP leads to T2D in future . Our objective was to examine CRP in male Type 2 Diabetes(T2D) patients in different age ,we studied 120 male subjects divided to two groups according to their age. First group A age (31 - 40) year old ,60 person )30 control & 30 T2D patients(,3 person for each same age: second group B age (41 – 50) years old ,60 person )30 control & 30 T2D patients(,3 person for each same age. We examined blood sugar ,cholesterol and CRP in each group. and we toke the mean of samples in the same age in each data in all the 4 groups. Our data shows that CRP
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreThe massive distribution and development in the digital images field with friendly software, that leads to produce unauthorized use. Therefore the digital watermarking as image authentication has been developed for those issues. In this paper, we presented a method depending on the embedding stage and extraction stag. Our development is made by combining Discrete Wavelet Transform (DWT) with Discrete Cosine Transform (DCT) depending on the fact that combined the two transforms will reduce the drawbacks that appears during the recovered watermark or the watermarked image quality of each other, that results in effective rounding method, this is achieved by changing the wavelets coefficients of selected DWT sub bands (HL or HH), followed by
... Show MoreThe research tackles the potential challenged faced the translator when dealing with the literal translation of nowadays political terms in media. Despite the universal complexity of translating political jargon, adopting literal translation introduces an added layer of intricacy. The primary aim of literal translation is to maintain faithfulness to the original text, irrespective of whether it is in English or Arabic. However, this method presents several challenges within the linguistic and cultural dimensions. Drawing upon scholarly sources, this article expounds upon the multifaceted issues that emerge from the verbatim translation of political terms from English into Arabic. These problems include political culture, language differenc
... Show More