Preferred Language
Articles
/
mhcUOI8BVTCNdQwCW2NF
Use of learning methods for gender and age classification based on front shot face images
...Show More Authors

Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of a Training Program Based on Connectivism Theory in Developing E-Learning Competencies among Teachers of Islamic Education in Dhofar Governorate
...Show More Authors

Abstract

The study aims to build a training program based on the Connectivism Theory to develop e-learning competencies for Islamic education teachers in the Governorate of Dhofar, as well as to identify its effectiveness. The study sample consisted of (30) Islamic education teachers to implement the training program, they were randomly selected. The study used the descriptive approach to determine the electronic competencies and build the training program, and the quasi-experimental approach to determine the effectiveness of the program. The study tools were the cognitive achievement test and the observation card, which were applied before and after. The study found that the effectiveness of the training program

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
PREPARATION OF NITRATION DERIVATIVES OF BILE SALTS AND ACIDS FOR MEDICAL USE
...Show More Authors

The derivatives formed after the successive acetylation, esterification and nitration reactions to cholic, deoxycholic, and taurocholic acids were identified to be of the following general strucure: Colt, Where RI=NO3, OH, 0=, or CH3COO. R2=H, NO3, OH, 0-=, or CH3COO. R3=H, NO3,01-1, 0=, or CH3COO. R4=OH, NH(CH2)2S03Na, NH(CH2)2S03H, or OMe. By using U.V-visible and I.R spectrophotometry . The number of hydroxyl groups was determined, purity was checked from T.L.C, Most of these derivatives will find pharmaceutical application.

View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Religious principles of ethic and globalization of the modern age
...Show More Authors

0

View Publication Preview PDF
Publication Date
Fri Apr 01 2011
Journal Name
Iraqi Journal Of Community Medicine
Anatomical and Histological Features of Placentae of Different Age Groups
...Show More Authors

Methods: 112 placentae samples were investigated during the period from August 2007 to August 2008 under light microscopefor mother aged 15 - 45 years old.Results: It was found that normal placental shapes had no correlation to mother age, while abnormal shapes were found more inyoung age groups. The better placental measured parameters were found in mother age 20-24 years. The percentages ofabnormal umbilical cord insertion were very high compared to other studies. Babies’ gender had a correlation with theplacental thickness; male babies have thicker placentae than females. Male babies have longer umbilical cords with widerdiameter than females. Light microscope picture showed the chorionic villi with isolated fetal blood vessel were hig

... Show More
Publication Date
Sun Mar 01 2026
Journal Name
Interdisciplinary Neurosurgery
Comparing longitudinal and transverse wound closure methods for spina bifida
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
2016 International Conference On Advances In Electrical, Electronic And Systems Engineering (icaees)
Efficient routing algorithm for VANETs based on distance factor
...Show More Authors

There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th

... Show More
View Publication
Scopus (9)
Crossref (8)
Scopus Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2022
Journal Name
Sport Tk-revista Euroamericana De Ciencias Del Deporte
Level of professional pressures during the use of e-learning teaching method among teachers of the Faculties of Physical Education and Sports Sciences in Baghdad
...Show More Authors

View Publication
Scopus (9)
Crossref (4)
Scopus Crossref