Preferred Language
Articles
/
AxcIfY4BVTCNdQwCLUvg
Neurosurgery theater-based learning: Etiquette and preparation tips for medical students
...Show More Authors

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
Resilience among Students in Baghdad University
...Show More Authors

Abstract

The current study aims to identify the resilience of university students, as well as identify the differences in resilience according to the variable of gender and specialization. The research sample consisted of (382) students studying at Baghdad University. To measure Resilience, a questionnaire of (48) items was designed to collect the needed data. The results showed that the students of the University of Baghdad possess resilience. There are no differences in resilience according to gender and specialization.

View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Smart Thinking at Secondary Schools' Students
...Show More Authors

Present research is aimed knowing of smart thinking for secondary schools' students. and discover statistically significant differences in Smart Thinking due to the couple variables of (Gender – Branch)
For the purpose of verification of the aims of the research, the researcher has prepared a smart thinking scale, the scale has been applied on sample of secondary schools' students for both Branches (Scientific & Literary One).It was contingent (500) student male and female were chosen stratified random method.
After data analyze the reached results: The Preparatory fourth grade students have smart thinking. Female smart thinking enjoy a much higher degree than males. and Scientific branch students enjoy thinking and much high

... Show More
View Publication Preview PDF
Publication Date
Tue May 24 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Computational Thinking (CT) Among University Students
...Show More Authors

Computational Thinking (CT) is very useful in the process of solving everyday problems for undergraduates. In terms of content, computational thinking involves solving problems, studying data patterns, deconstructing problems using algorithms and procedures, doing simulations, computer modeling, and reasoning about abstract things. However, there is a lack of studies dealing with it and its skills that can be developed and utilized in the field of information and technology used in learning and teaching. The descriptive research method was used, and a test research tool was prepared to measure the level of (CT) consisting of (24) items of the type of multiple-choice to measure the level of "CT". The research study group consists of

... Show More
View Publication
Crossref (7)
Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
The Possible Self of University Students
...Show More Authors

The current research aims to identify the possible self of university students and the differences in the level of possible self of students in terms of gender, specialization (scientific-humanitarian), and the interaction between them. In order to achieve the objectives of the current research, the two researchers have prepared a scale of the possible self, based on the theory (Markus and Nurius, 1986). The research tool was applied to a sample of (400) male and female students who were selected through a random stratified method from Al-Mustansiriya University students/morning studies for the academic year (2019-2020). The researcher reached the following results: the research sample has a high level of possible self; there is a differ

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Educational And Psychological Researches
Ingratiating Behavior of the University Students
...Show More Authors

The current study aims to find out:

  1. The ingratiating behavior of university students.
  2. The differences of statistical significance in The ingratiating behavior among university students according to the variables of sex and specialization

The current study is determined by University of Baghdad students of both genders (males and females) and for both majors (scientific and humanities) for the academic year (2019-2020).

In order to achieve the researcher's objectives:Ingratiating behavior scale has been constructed. It consists in its final form of (32) items divided into four behaviors. The researcher has extracted scale validity and reliability.

The researcher based the two scales

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Educational And Psychological Researches
Psychological Resilience among Middle School Students
...Show More Authors

Abstract

The current research aims to identify psychological resilience among middle school students. a sample of (300) male and female students was chosen from Al- Azmaa Intermediate School for Boys and Ohran Intermediate School for Girls, It is affiliated with the second Rusafa Education Directorate in Baghdad Governorate. To achieve the research objective, the researcher adopted a scale of Luthar & Cicchetti (2000) to measure psychological resilience. The results showed that middle school students have psychological resilience. There is no significant difference in psychological resilience between males and females.

View Publication Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
An Experimental Study of the Server-based Unfairness Solutions for the Cross-Protocol Scenario of Adaptive Streaming over HTTP/3 and HTTP/2
...Show More Authors

Since the introduction of the HTTP/3, research has focused on evaluating its influences on the existing adaptive streaming over HTTP (HAS). Among these research, due to irrelevant transport protocols, the cross-protocol unfairness between the HAS over HTTP/3 (HAS/3) and HAS over HTTP/2 (HAS/2) has caught considerable attention. It has been found that the HAS/3 clients tend to request higher bitrates than the HAS/2 clients because the transport QUIC obtains higher bandwidth for its HAS/3 clients than the TCP for its HAS/2 clients. As the problem originates from the transport layer, it is likely that the server-based unfairness solutions can help the clients overcome such a problem. Therefore, in this paper, an experimental study of the se

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of the Current Financial Crisis : Causes and Solutions (Iraqi crisis a model , based on the public budget for the fiscal year 2016)
...Show More Authors

The research aims to analysis of the current financial crisis in Iraq through knowing its causes and then propose some solutions that help in remedy the crisis and that on the level of expenditures and revenues, and has been relying on the Federal general budget law of the Republic of Iraq for the fiscal year 2016 to obtain the necessary data in respect of the current expenditures and revenues which necessary to achieve the objective of the research , and through the research results has been reached to a set of conclusions which the most important of them that causes of the current financial crisis in Iraq , mainly belonging to increased expenditures and especially the current ones and the lack of revenues , especially non-oil o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref