The study aimed to explore the effectiveness of using rational judgment strategy in teaching science to develop scientific thinking for second-grade students. The researcher utilized the quasi-experimental approach based on (the pre/post designing) of two groups: experimental and control. As for tools: a test of scientific thinking prepared by the researcher that proved its verification of their validity and reliability. The test applied on a random sample of (66) students, divided into two groups: (34) experimental, and (32) control. The results showed that the experimental group outperformed the control group in the post-application of the scientific thinking test, In each skill separately, and in the total skills. The study recommende
... Show Moreinsulin-like Growth Factor 1 (IGF-1) gene has been described in several studies as a candidate gene for growth. The present study attempts to identify associations between body weight traits and polymorphisms at 279 position of 5'UTR flanking region of IGF-1 gene in broiler chickens. Three hundred broiler chickens from two breeds (Cobb 500 and Hubbard F-15) were used in this study. A single nucleotide polymorphism (SNP) at 279 position of 5'UTR region of the IGF-1 gene was identified in 20.6 and 60.3% of Cobb 500 and Hubbard F-15, respectively, using the PCR-RFLP technique. Allele frequencies were 83.87 and 42.80% for the T allele and 16.13 and 57.20% for the C allele in Cobb500 and Hubbard-15 breeds, respectively. Genotype frequencies were
... Show MoreThe research aimed at measuring the compatibility of Big date with the organizational Ambidexterity dimensions of the Asia cell Mobile telecommunications company in Iraq in order to determine the possibility of adoption of Big data Triple as a approach to achieve organizational Ambidexterity.
The study adopted the descriptive analytical approach to collect and analyze the data collected by the questionnaire tool developed on the Likert scale After a comprehensive review of the literature related to the two basic study dimensions, the data has been subjected to many statistical treatments in accordance with res
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreThe food web is a crucial conceptual tool for understanding the dynamics of energy transfer in an ecosystem, as well as the feeding relationships among species within a community. It also reveals species interactions and community structure. As a result, an ecological food web system with two predators competing for prey while experiencing fear was developed and studied. The properties of the solution of the system were determined, and all potential equilibrium points were identified. The dynamic behavior in their immediate surroundings was examined both locally and globally. The system’s persistence demands were calculated, and all conceivable forms of local bifurcations were investigated. With the aid of MATLAB, a numerical simu
... Show MoreThe long-term monitoring of land movements represents the most successful application of the Global Navigation Satellite System (GNSS), particularly the Global Positioning System. However, the application of long term monitoring of land movements depends on the availability of homogenous and consistent daily position time series of stations over a period of time. Such time series can be produced very efficiently by using Precise Point Positioning and Double Difference techniques based on particular sophisticated GNSS processing softwares. Nonetheless, these rely on the availability of GNSS products which are precise satellite orbit and clock, and Earth orientation parameters. Unfortunately, several changes and modifications have been mad
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThis study aimed to incorporate hydroxyapatite nanoparticles (nHA) or amorphous calcium phosphate nanoparticles (nACP) into a self-etch primer (SEP) to develop a simplified orthodontic bonding system with remineralizing and enamel preserving properties.
nHA and nACP were incorporated into a commercial SEP (Transbond™ plus) in 7% weight ratio and compared with the plain SEP as a control. Shear bond strengths (SBS), enamel damage, and adhesive remnant index (ARI) scores were evaluated at 24 h
In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection
... Show More