Neurosurgery theater-based learning: Etiquette and preparation tips for medical students
...Show More Authors
This study aimed at accounting for the role of talents management in consolidating organizational learning process at the Yemeni General Corporation For telecommunication. To achieve the objective of the study, the researcher designed a questionnaire and administered it. The sample of the study consisted of (166) employees (General Manager, Manager and Department Head). They were selected randomly out of a total Population of (291) employees during the Year 2019. The descriptive analytic approach was used t reach conclusions.
The finding of the study revealed existence of effect of talents management dimensions, all together and alone, (talents polarization, talents development, talents maintenance and ma
... Show MoreGlobally, buildings use about 40% of energy. Many elements, such as the physical properties of the structure, the efficiency of the cooling and heating systems, the activity of the occupants, and the building’s sustainability, affect the energy consumption of a building. It is really difficult to predict how much energy a building will need. To improve the building’s sustainability and create sustainable energy sources to reduce carbon dioxide emissions from fossil fuel combustion, estimating the building's energy use is necessary. This paper explains the energy consumed in the lecture building of the Al-Khwarizmi College of Engineering, University of Baghdad (UOB), Baghdad, Iraq. The weather data and the building construction informati
... Show MoreThis study aims to prepare educational sessions for the strategy (team-pair-solo) in practical volleyball lessons for female students and identifying its effect on learning the accuracy of the spiking skill in volleyball. An experimental design with experimental and control groups was employed on a purposive sample of (30) female students who were to constitute (42.254%) from their community represented by the sophomores at the College of Physical Education and Sports Sciences for Girls / University of Baghdad who are in good standing in the morning study for the academic year (2022-2023), whose total number is (71) students. According to the determinants of the experimental design, participants were divided into two equal groups, a
... Show MoreAbstract The aim of this study is preparing an intellectual map according to the feedback (verbally and writhingly ) in order to learn some skills of floor exercises in the women's artistic gymnastics , In addition to that the aim of this study defines on the impacts of intellectual map according to the feedback approach, and to identify the best group between the three groups study in the learning of skills approach in this study, the researchers used the experimental method, the subject of the study included on students second class in physical education and sport sciences , Baghdad University (2014-2015) , and divided into three groups for teaching skills which was under studied .The species used the specific manner by lot for selection
... Show MoreThe study aimed to identify the use of the electronic concept maps method in learning some of the skills of the floor exercises in the artistic gymnastics for third graders ,as well as to identify the best group between the two research groups (experimental And the officer to learn and retain some of the skills of the floor exercises in the artistic gymnastics of the research subject , and the experimental method was used and included the sample research on students of the collage of Physical Education and Sports Sciences/University of Baghdad, third grade, and has selected (10) Students for each group of The experimental and controlling groups randomly by lottery and after the completion of the period of implementation of the experiment wh
... Show MoreThe research has been based on two main variables (information and communication technology) and the quality of blended education (physical and electronic), aiming to reveal the relationship between four dimensions (physical devices, software, databases, communication networks) and the elements of education represented by (the teacher, the student, the teaching process, curriculum). The methodology and post-analysis-based research were conducted at the Technical College of Management / Baghdad through polling the opinions of a random sample that included (80) teachers out of (86) and the number of students (276) representing a random sample from all departments of the college (for the morning study) out of (3500) stud
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreIn this work we present a technique to extract the heart contours from noisy echocardiograph images. Our technique is based on improving the image before applying contours detection to reduce heavy noise and get better image quality. To perform that, we combine many pre-processing techniques (filtering, morphological operations, and contrast adjustment) to avoid unclear edges and enhance low contrast of echocardiograph images, after implementing these techniques we can get legible detection for heart boundaries and valves movement by traditional edge detection methods.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show More