The study aimed to reveal the level of knowledge and tendencies of high- study students specializing in curriculum and teaching methods at King Khalid University towards harmonious strategies with brain-based learning (BBL). And Then, putting a proposed concept to develop knowledge and tendencies of high-study students specializing in curriculum and teaching methods at King Khalid University towards harmonious strategies with Brain-based learning (BBL). For achieving this goal, a cognitive test and a scale of tendency were prepared to apply harmonious strategies with brain-based learning. The descriptive approach was used because it suits the goals of the study. The study sample consisted of (70) male and female students of postgraduate
... Show MoreIn recent decades, drug modification is no longer unusual in the pharmaceutical world as living things are evolving in response to environmental changes. A non-steroidal anti-inflammatory drug (NSAID) such as aspirin is a common over-the-counter drug that can be purchased without medical prescription. Aspirin can inhibit the synthesis of prostaglandin by blocking the cyclooxygenase (COX) which contributes to its properties such as anti-inflammatory, antipyretic, antiplatelet and etc. It is also being considered as a chemopreventive agent due to its antithrombotic actions through the COX’s inhibition. However, the prolonged use of aspirin can cause heartburn, ulceration, and gastro-toxicity in children and adults. This review article hi
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreThis paper constructs a new linear operator associated with a seven parameters Mittag-Leffler function using the convolution technique. In addition, it investigates some significant second-order differential subordination properties with considerable sandwich results concerning that operator.
The psychological scientific studies suggest that basic human situations stem from human emotional abilities and those with a lack of emotional intelligence are unable to cope with life, which might lead to anxiety and psychological depression. The current study aimed to investigate this problem by identifying the level of emotional intelligence and psychological depression among the students of the University of Anbar. To achieve the objectives of the study, the researchers created two questionnaires: 1) to measure emotional intelligence. 2) to measure psychological depression and applied these questionnaires on (300) students. The results revealed that the participants showed a high level of emotional intelligence with a low level of p
... Show MoreThe research aimed at studying the inhibitive effect of the hot watery dry and ethanolic ginger(85%) and fragrant oil which are added in concentrates of o.o25, o.o5o and 0.1g / 100g respectively in the growth of bacteria and molds. The results of the initial chemical diagnosis showed containment of ginger roots extract on. Alkaloids, Glycosides, Flavonoids and Suponins. The highest inhibitive effect of the bacteria reached the concentrate . 0.1% of the oil extract then the concentrate 0.050% of the ethanolic hot extract follows it. While 0.1% was the least inhibitive concentrate for the hot watery extract. But the inhibitive effect of the hot oily and alcoholic extracts in the numbers of molds colonies was 0.025%, when the concentra
... Show MoreIn many scientific fields, Bayesian models are commonly used in recent research. This research presents a new Bayesian model for estimating parameters and forecasting using the Gibbs sampler algorithm. Posterior distributions are generated using the inverse gamma distribution and the multivariate normal distribution as prior distributions. The new method was used to investigate and summaries Bayesian statistics' posterior distribution. The theory and derivation of the posterior distribution are explained in detail in this paper. The proposed approach is applied to three simulation datasets of 100, 300, and 500 sample sizes. Also, the procedure was extended to the real dataset called the rock intensity dataset. The actual dataset is collecte
... Show MoreIn this study, we introduce new a nanocomposite of functionalize graphene oxide FGO and functionalize multi wall carbon nanotube (F-MWCNT-FGO).The formation of nanocomposite was confirmed by FT-IR ,XRD and SEM. The magnitude of the dielectric permittivity of the (F-MWCNT-FGO) nanocomposite appears to be very high in the low frequency range and show a unique negative permittivity at frequencies range from 400 Hz to 4000Hz. The ac conductivity of nanocomposite reaches 23.8 S.m-1 at 100Hz.