The research aimed to identify “The impact of an instructional-learning design based on the brain- compatible model in systemic thinking among first intermediate grade female students in Mathematics”, in the day schools of the second Karkh Educational directorate.In order to achieve the research objective, the following null hypothesis was formulated:There is no statistically significant difference at the significance level (0.05) among the average scores of the experimental group students who will be taught by applying an (instructional- learning) design based to on the brain–compatible model and the average scores of the control group students who will be taught through the traditional method in the systemic thinking test.The research community was determined and represented by the intermediate and secondary day schools for girls within the Karkh II general educational directorate, and Al-Jana in Intermediate School for girls was selected, the research sample consisted of (75) female students from the first intermediate grade that were distributed as (37) students female in the first experimental group, and (38) in the control group.For the purpose of the research hypothesis testing, a systemic thinking test was built, as the test in its final form consisted of (24) essay items with restricted answers, and the test was divided into ( (2) items for each sub-skill).The appropriate statistical analysis were carried out (the difficulty coefficient and coefficient of ease, the discrimination coefficient, and the effect of wrong alternatives), and their psychometric properties were ascertained,after the statistical tools were chosen to analyze the results of the application of the test, such as using the (t-test), and the results indicated:The experimental group students who studied according to the brain concordance model out performed in the systemic thinking test on the control group students who studied according to the traditional method.
This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti
... Show MoreThe investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreFor businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers
... Show MoreDetermining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on
... Show MoreIn cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreIrinotecan (CPT-11) is a semisynthetic derivative of the antineoplastic agent camptothecin used in a wide range as an anti-cancer agent in many solid tumors because of its cytotoxic effect through the interaction with the topoisomerase I enzyme. The major limiting factors for irinotecan treatment are its association with potentially life-threatening toxicities including neutropenia and acute or delayed-type diarrhea, results from distinct interindividual and interethnic variability due to gene polymorphism.
This is a cross sectional pharmacogentics study was conducted on 25 cancer patients to estimate the prevalence of UGT1A1*93 and ABCC5 allele single nucleotide polymorphism (SNP) in Iraqi cancer patients treated with irinotecan
... Show MoreBackground: Urinary incontinence (UI) is a common disorder that affects women of various ages and impacts all aspects of life. This condition negatively influences quality of life. Fractional CO2 laser (10600nm) is the recent method for treatment of stress urinary incontinence in women. Objectives: The purpose of the study was to evaluate the efficacy and safety of fractional CO2 laser (10600nm) in the treatment of female stress urinary incontinence. Materials & Methods: This study was done from July 2020 to February 2021conducted at the laser institute for postgraduate studies university of Baghdad, patients collected from a private clinic and the Department of
... Show More