Preferred Language
Articles
/
sxeLEJMBVTCNdQwCUcVD
Using Scenarios to Assess Student Learning
...Show More Authors

Crossref
View Publication
Publication Date
Fri Mar 01 2024
Journal Name
Annales Pharmaceutiques Françaises
Adopting video assignments as a tool to improve first-year pharmacy students class engagement
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sat Jun 26 2021
Journal Name
Journal Of The College Of Education For Women
The Wisdom-Based Thinking and its Relationship to the Psychological Capital: طلل غالب علوان
...Show More Authors

The present study aims to identify wisdom-based thinking and its relationship to psychological capital. It further aims to find out the differences in the level of wisdom-based thinking and psychological capital according to the variables of gender and specialization (scientific, humanities). To achieve this, the study has been conducted on a sample of (380) male and female students. The two scales, wisdom-based thinking and psychological capital are implemented to the sample after being constructed by the researcher and after ensuring their psychometric characteristics' suitability for the study's aims. Results concerning the first aim have shown that there is a significant relationship among students. The second aim has revealed that t

... Show More
View Publication
Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Sun Apr 17 2016
Journal Name
Al-academy
The art of make-up and its relation to personality play: زيد سالم سليمان
...Show More Authors

It is well known that the art of theater is based on multiple elements come in the forefront of Representative and his work, and must be of such a representative of the kits help him to complete his work and take it out the image that aspires to it is team work, and these supplies are in the two main axes:First: Internal supplies which runs from the imagination through the focusing and memory Representative and adapts to situations and positions and others.The second is a foreign supplies, which starts from his words and gestures and his movement and his voice, which is the need to requirements help to maturation and completion of this aspect, including the lighting, costumes, decor, make-up, is the role of make-up theater and its import

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 28 2021
Journal Name
Route Educational & Social Science Journal
ARTISTIC EXPRESSION AMONG PRIMARY SCHOOL STUDENTS AND ITS RELATIONSHIP TO THE CONTEMPLATIVE THINKING VARIABLE
...Show More Authors

The early childhood stage, which is usually described as establishing the development and growth of most of the child’s mental, psychological, moral, and physical abilities, so scientists and researchers have been interested in the growth and upbringing of the child, especially for the specified period between (6 until the age of 11) due to the importance of education in this stage. The age stage in terms of developing the child’s senses and experiences, because he is by nature inclined to play and draw in his instinctive activity, according to which his natural responses to stimuli and his contemplation of what surrounds him change. Since drawing plays an important role in raising a child from an emotional and intellectual point of vie

... Show More
Publication Date
Thu Nov 01 2012
Journal Name
Ijcsi International Journal Of Computer Science
Implementing a novel approach an convert audio compression to text coding via hybrid technique
...Show More Authors

Compression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio fil

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
The reasons for the failure of Bishara CO2 compressor belonging to Southern Fertilizer Company
...Show More Authors

In this research study failed Annunciation No. 10 for the fourth phase of the pressure of carbon dioxide of the company for Southern Fertilizers and repeated the failures more than once for the same gospel was a detailed study of the gospel included a series tests for properties Mechanical and Structural addition to the tests microscopic and scanning electron microscope shows m This study parameters and a failure Elal well as the existence of an old internal cracks in the metal of the Annunciation

View Publication Preview PDF
Publication Date
Thu Jul 08 2021
Journal Name
Turkish Online Journal Of Qualitative Inquiry (tojqi)
Civil Protection of Rights contiguous to Author’s Royalty in Iraqi Law A comparative study
...Show More Authors

Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
An Approximate solution for two points oundary value problem corresponding to some optimal control
...Show More Authors

this paper presents a novel method for solving nonlinear optimal conrol problems of regular type via its equivalent two points boundary value problems using the non-classical

View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref