Preferred Language
Articles
/
jperc-914
The Level of Academic Achievement and its Relationship with Some Characteristics of Female Students at College of Education for Girls in Baghdad University: The Level of Academic Achievement and its Relationship with Some Characteristics of Female Students at College of Education for Girls in Baghdad University
...Show More Authors

 

Abstract

Personality is one of the most important elements that should be developed in university student. Thus, we have to develop the positive traits and neutralize the negative traits of students as well as we have to pay attention to the level of student achievement at the same time, the researcher designed a scale to measure the traits of study sample. The research come out with a number of recommendations and proposals, the most important of which Enhancing the positive characteristics of university students in order to reach them to the level of mature personality with mental health. Enhancing the positive role of the high level of achievement by motivating the students with continuous reward and in all the ways they are capable of in university education. Additionally, the researcher recommended conducting a similar study involving a number of Iraqi universities to compare the results achieved and access to Iraqi approaches that enhance the positive aspects of the personality of university students.

 

Keywords: Standard Of Academic Achievement, Personality Traits, University Students

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Silica Fume Modified Cement-Based Mortar Exposed to High Temperatures: Residual Strengths and Microstructure
...Show More Authors

Several previous investigations and studies utilized silica fume (SF) or (micro silica) particles as supplementary cementitious material added as a substitute to cement-based mortars and their effect on the overall properties, especially on physical properties, strength properties, and mechanical properties. This study investigated the impact of the inclusion of silica fume (SF) particles on the residual compressive strengths and microstructure properties of cement-based mortars exposed to severe conditions of elevated temperatures. The prepared specimens were tested and subjected to 25, 250, 450, 600, and 900 °C. Their residual compressive strengths and microstructure were evaluated and compared with control samples (C

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Dec 08 2023
Journal Name
Iraqi Journal Of Science
AL-Dibdiba Formation Basin Hydrological Aspects Extraction Using GIS techniques and Quantitative Morphometric Analysis
...Show More Authors

The drainage basin's hydrological aspect studying is considered to be important issue because of their influence (especially in arid to semi-arid regions) on the water management projects, agricultural management projects, and grazing ones. The importance of this study is coming from the fact that AL-Dibdiba formation basin climate is arid to semi-arid and there are human activities (habitation and agricultural) in the east part of it, so the water resources management is needed for this basin. The morphometric analysis illustrates the hydrological aspects in a quantitative form; the problem is the use of the traditional schemes in the calculation processes (such as the topographic map and the planmeter), which coast time and money and a

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 25 2009
Journal Name
Wireless Personal Communications
A N-Radon Based OFDM Trasceivers Design and Performance Simulation Over Different Channel Models
...Show More Authors

In this paper a new method is proposed to perform the N-Radon orthogonal frequency division multiplexing (OFDM), which are equivalent to 4-quadrature amplitude modulation (QAM), 16-QAM, 64-QAM, 256-QAM, ... etc. in spectral efficiency. This non conventional method is proposed in order to reduce the constellation energy and increase spectral efficiency. The proposed method gives a significant improvement in Bit Error Rate performance, and keeps bandwidth efficiency and spectrum shape as good as conventional Fast Fourier Transform based OFDM. The new structure was tested and compared with conventional OFDM for Additive White Gaussian Noise, flat, and multi-path selective fading channels. Simulation tests were generated for different channels

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Al-khwarizmi Engineering Journal
Citric Acid Production: Raw Material, Microbial Production, Fermentation Strategy and Global Market: Critical Review
...Show More Authors

Citric acid is an essential ingredient for the manufacture of (12) key industrial chemicals. Citric acid use is increasing steadily with a high annual growth rate as a result of the development of ever more sophisticated applications. Citric acid is widely utilized in the food and pharmaceutical industries due to its low toxicity when compared to other acidulous. Other uses for citric acid can be found in cleaning supplies and detergents. Based on information from a review of the literature, Citric acid production substrates and methods for surface fermentation, submerged fermentation, solid-state fermentation, and international market expansion are all covered in the current review study. Finally, there is still much to learn about the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Feb 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Hybrid Algorithm to Protect Computer Networks Based on Human Biometrics and Computer Attributes
...Show More Authors

Objective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have uniqu

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 26 2020
Journal Name
Iraqi Journal Of Science
Selective Image Encryption Based on DCT, Hybrid Shift Coding and Randomly Generated Secret Key
...Show More Authors

Most of today’s techniques encrypt all of the image data, which consumes a tremendous amount of time and computational payload. This work introduces a selective image encryption technique that encrypts predetermined bulks of the original image data in order to reduce the encryption/decryption time and the
computational complexity of processing the huge image data. This technique is applying a compression algorithm based on Discrete Cosine Transform (DCT). Two approaches are implemented based on color space conversion as a preprocessing for the compression phases YCbCr and RGB, where the resultant compressed sequence is selectively encrypted using randomly generated combined secret key.
The results showed a significant reduct

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (5)
Scopus Crossref
Publication Date
Wed Nov 19 2014
Journal Name
Journal Of Biosciences
Caspase-like proteins: Acanthamoeba castellanii metacaspase and Dictyostelium discoideum paracaspase, what are their functions?
...Show More Authors

View Publication
Scopus (8)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Sumer 1
Biologically synthesized Copper Nanoparticles from S. epidermidis on resistant S. aureus and cytotoxic assay
...Show More Authors

The risk of significant concern is resistance to antibiotics for public health. The alternative treatment of metallic nanoparticles (NPs), such as heavy metals, effects on antibiotic resistance bacteria with different types of antibiotics of - impossible to treat using noval eco-friendly synthesis technique nanoparticles copper oxide (CuO NPs) preparation from S. epidermidis showed remarkable antimicrobial activity against S.aureus Minimum inhibitory concentra range (16,32,64,256,512) µg/ml via well diffusion method in vitro, discover those concentrations effected in those bacteria and the best concentration is 64 µg/ml, characterization CuO NPs to prove this included atomic force microscope, UV, X-ray Diffraction and TEM, and ant

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sun Mar 05 2017
Journal Name
Baghdad Science Journal
Cache Coherence Protocol Design and Simulation Using IES (Invalid Exclusive read/write Shared) State
...Show More Authors

To improve the efficiency of a processor in recent multiprocessor systems to deal with data, cache memories are used to access data instead of main memory which reduces the latency of delay time. In such systems, when installing different caches in different processors in shared memory architecture, the difficulties appear when there is a need to maintain consistency between the cache memories of different processors. So, cache coherency protocol is very important in such kinds of system. MSI, MESI, MOSI, MOESI, etc. are the famous protocols to solve cache coherency problem. We have proposed in this research integrating two states of MESI's cache coherence protocol which are Exclusive and Modified, which responds to a request from reading

... Show More
View Publication Preview PDF
Scopus Crossref