Psychological research centers help indirectly contact professionals from the fields of human life, job environment, family life, and psychological infrastructure for psychiatric patients. This research aims to detect job apathy patterns from the behavior of employee groups in the University of Baghdad and the Iraqi Ministry of Higher Education and Scientific Research. This investigation presents an approach using data mining techniques to acquire new knowledge and differs from statistical studies in terms of supporting the researchers’ evolving needs. These techniques manipulate redundant or irrelevant attributes to discover interesting patterns. The principal issue identifies several important and affective questions taken from a questionnaire, and the psychiatric researchers recommend these questions. Useless questions are pruned using the attribute selection method. Moreover, pieces of information gained through these questions are measured according to a specific class and ranked accordingly. Association and a priori algorithms are used to detect the most influential and interrelated questions in the questionnaire. Consequently, the decisive parameters that may lead to job apathy are determined.
Objective: Determination the effectiveness of educational program on female students’ practices toward premenstrual.
Methodology: A quasi-experimental design study was conducted involving (140) student purposely in four secondary schools at Al-sadder city (70) student for study group and (70) for control group. The prevalence of PMS selected through American College of Obstetricians and Gynecologists (ACOG) (2015) criteria to select PMS students before program. The education program were set in four steps, the first step (pre-test) is to assess the practices, before the implementation of the program, the second step is implementing the program, following two steps post-test I and II betwe
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreA 3D Geological model was generated using an advanced geostatistical method for the Cretaceous reservoir in the Bai Hassan oil field. In this study, a 3D geological model was built based on data from four wells for the petrophysical property distribution of permeability, porosity, water saturation, and NTG by using Petrel 2021 software. The geological model was divided into a structural model and a property model. The geological structures of the cretaceous reservoir in the Bai Hassan oil field represent elongated anticline folds with two faults, which had been clarified in the 3D Structural model. Thirteen formations represent the Cretaceous reservoir which includes (Shiranish, Mashurah, U.kometan, Kometan Shale, L. Kometan, Gulnen
... Show MoreProblem: Cancer is regarded as one of the world's deadliest diseases. Machine learning and its new branch (deep learning) algorithms can facilitate the way of dealing with cancer, especially in the field of cancer prevention and detection. Traditional ways of analyzing cancer data have their limits, and cancer data is growing quickly. This makes it possible for deep learning to move forward with its powerful abilities to analyze and process cancer data. Aims: In the current study, a deep-learning medical support system for the prediction of lung cancer is presented. Methods: The study uses three different deep learning models (EfficientNetB3, ResNet50 and ResNet101) with the transfer learning concept. The three models are trained using a
... Show MoreBackground: With the increase in composite material use in posterior teeth, the concerns about the polymerization shrinkage has increased with the concerns about the formation of marginal gaps in the oral cavity environment. New generation of adhesives called universal adhesive have been introduced to the market in order to reduce the technique sensitive bonding procedures to give the advantage of using the bonding system in any etching protocol without compromising the bonding strength. The aim of the study was to study marginal adaptation of two universal adhesives (Single bondâ„¢ Universal and Prime and Bond elect) using 3 etching techniques under thermal cycling aging. Materials and Methods: Forty-eight sound maxillary first premola
... Show MoreAbstract:
This research (The effect of information in Iraqi universities) wants to
explain the aims and the opinions of Iraqi universities lecturers during the
globalization era and information technology .
The results we have got about using the computers by the lecturers of
Iraqi universities just in illustration and statistic as depends on there works
With the great development in the field of the Internet, the talk about the new media and its implications began, And its interactive services have made the future of media material sometimes participating in it and manufacturing it at other times,
the public is seeking information and choosing the appropriate ones, as well as exchanging messages with the sender after what the role of the receiver is just receiving information only.
This study aims to demonstrate the effects of using digital media in various forms and types to construct the value system of Iraqi society through the identification of the following aims:
Identify the most popular digital media for the Iraqi public in their daily lives on the Internet.
Identify