This research aims to know the intellectual picture the displaced people formed about aid organizations and determine whether they were positive or negative, the researchers used survey tool as standard to study the society represented by displaced people living in Baghdad camps from Shiites, Sunnis, Shabak, Turkmen, Christians, and Ezidis.
The researcher reached to important results and the most important thing he found is that displaced people living in camps included in this survey hold a positive opinion about organizations working to meet their demands but they complain about the shortfall in the health care side.
The research also found that displaced people from (Shabak, Turkmen, and Ezidi) minorities see that international organizations are taking care of them more than the Iraqi ones, while the Shite and Sunni displaced people said that the Iraqi organizations were providing their needs more than other organizations and this reveal that the international organizations were paying more intention for minorities .
Cognitive-behavioral therapy is one of the most important relatively recent; treatment programs that attempt to modify behavior and control psychological disorders by modifying the individual's thinking style and awareness of himself and his environment, and cognitive reconstruction by replacing negative thoughts with positive ones. The current study aimed to know the effectiveness of a cognitive behavioral treatment program in reducing nervous fatigue among mothers of children with cerebral palsy. The sample on which the nervous fatigue scale was applied consisted of (30) mothers whose son suffers from cerebral palsy, and the results indicated that (24) mothers suffer from nervous fatigue. This sample was divided
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreOmentin (or intelectin) is a main visceral fat secretory adipokine. There is a growing interest to link omentin, obesity and co-morbidity factors. The aim of the present study is to evaluate serum omentin and its association to insulin resistance biomarkers, lipid profile and atherogenic indies. This cross – sectional study was conducted in Obesity Research and Therapy Unit-Alkindy College of Medicine by recruiting (115) individuals; 49 males /66 females. Subjects between (20 to 60) years of age were selected and classified into two groups according to their Body mass index (BMI). Group1 involved healthy lean volunteers (25 male/ 36 female; BMI 18.5 - 24.9). Group2 involved obese subjects; (24 male / 36 female with BMI ≥ 30). The s
... Show MoreThe research aims to know (the effect of the pdeode strategy) in acquiring historical concepts among the fourth-grade literary female students in the history module. To achieve the goal of this research, the following null hypothesis was formulated. There is no statistically significant difference at the level of (0.05) between the average scores of the experimental group students, who study history according to the PDEODE strategy, and the average scores of the control group students who study the same module in the traditional way of the historical concepts acquisition test.The researcher chose the experimental method for the current research and adopted the experimental design of partial control with a post-test, which depends on the
... Show MoreRecent research looking for acknowledgment of strategically influence of Robinson and self question at progressing the reading comprehension for students of sixth class .
To achieve research goal so the researcher mentally chose primary sixth class at the school (Tashti the primary) that followed education directorate of province (Jamjamal)/Suliymania for the scholastic year 2012-2013 as application field for their experiment of boys' number reached to (95) (female and male)students in reality (32) of the first experimental group and (31) student (female and male) from controlled group, the researcher rewarded between of three variable groups (timing period, intelligence ,Kurdish language degr
... Show MoreThe study aims to identify the metamemory and perceptual speed among College students, the correlation between metamemory and perceptual speed among College students, and to which extend does metamemory contribute to perceptual speed among College students. The sample consisted of group of students were selected randomly by the researcher from five-different disciplines at the college of education for pure sciences. To collect study data, the researcher utilized two scales: perceptual speed scale that has translated to Arabic language by (Al-Shraqawi, Al- Shaikh, and Nadia Abed Al-Salam (1993). The second scale is metamemory scale (2002) which has translated to Arabic by Abu Ghazal (2007). The results revealed that college students have
... Show MoreOptical Mark Recognition (OMR) is the technology of electronically extracting intended data from marked fields, such as squareand bubbles fields, on printed forms. OMR technology is particularly useful for applications in which large numbers of hand-filled forms need to be processed quickly and with a great degree of accuracy. The technique is particularly popular with schools and universities for the reading in of multiple choice exam papers. This paper proposed OMRbased on Modify Multi-Connect Architecture (MMCA) associative memory, its work in two phases: training phase and recognition phase. The proposed method was also able to detect more than one or no selected choice. Among 800 test samples with 8 types of grid answer sheets and tota
... Show MoreA common approach to the color image compression was started by transform
the red, green, and blue or (RGB) color model to a desire color model, then applying
compression techniques, and finally retransform the results into RGB model In this
paper, a new color image compression method based on multilevel block truncation
coding (MBTC) and vector quantization is presented. By exploiting human visual
system response for color, bit allocation process is implemented to distribute the bits
for encoding in more effective away.
To improve the performance efficiency of vector quantization (VQ),
modifications have been implemented. To combines the simple computational and
edge preservation properties of MBTC with high c
Image compression is one of the data compression types applied to digital images in order to reduce their high cost for storage and/or transmission. Image compression algorithms may take the benefit of visual sensitivity and statistical properties of image data to deliver superior results in comparison with generic data compression schemes, which are used for other digital data. In the first approach, the input image is divided into blocks, each of which is 16 x 16, 32 x 32, or 64 x 64 pixels. The blocks are converted first into a string; then, encoded by using a lossless and dictionary-based algorithm known as arithmetic coding. The more occurrence of the pixels values is codded in few bits compare with pixel values of less occurre
... Show MoreProtecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa
... Show More