هدف البحث التعرف على الذكاء الروحي لدى عينة من طلبة جامعة بغداد فضلا عن التعرف على الفروق بين الطلبة في الذكاء الروحي وفق متغير النوع ( الذكور- الإناث) ، ومتغير التخصص الدراسي ( علمي – إنساني) ومتغير المرحلة الدراسية ( المرحلة الأولى-المرحلة الرابعة) تألفت عينة البحث من (300) طالباً وطالبة ، وتم تطبيق - مقياس الذكاء الروحي وهو ( من إعداد الباحثة) ، وقد اسفرت نتائج البحث عن:--إن طلبة جامعة بغداد( عينة البحث) تمتعوا بمستوى مرتفع من الذكاء الروحي.-عدم وجود فروق بين الذكور والإناث في الذكاء الروحي .-عدم وجود فروق بين طلبة التخصص الدراسي العلمي والانساني في الذكاء الروحي.-وجود فروق بين بين طلبة المرحلة الدراسية الأولى وطلبة المرحلة الدراسية الرابعة في الذكاء الروحي ولصالح طلبة المرحلة الدراسية الرابعة.-وفي ضوء نتائج البحث اوصت الباحثة ببعض التوصيات
The microdrilling and nanodrilling holes are produced by a Q-switched Nd :YAG laser (1064 nm) interaction with 8009 Al alloy using nanoparticles. Two kinds of nanoparticles were used with this alloy. These nanoparticles are tungsten carbide (WC) and silica carbide (SiC). In this work, the microholes and nanoholes have been investigated with different laser pulse energies (600, 700 and 800)mJ, different repetition rates (5Hz and 10Hz) and different concentration of nanoparticles (90%, 50% and 5% ). The results indicate that the microholes and nanoholes have been achieved when the laser pulse energy is 600 mJ, laser repetition rate is 5Hz, and the concentration of the nanoparticles (for the two types of n
... Show MoreAbstract
This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an
... Show MoreHealthcare professionals routinely use audio signals, generated by the human body, to help diagnose disease or assess its progression. With new technologies, it is now possible to collect human-generated sounds, such as coughing. Audio-based machine learning technologies can be adopted for automatic analysis of collected data. Valuable and rich information can be obtained from the cough signal and extracting effective characteristics from a finite duration time interval that changes as a function of time. This article presents a proposed approach to the detection and diagnosis of COVID-19 through the processing of cough collected from patients suffering from the most common symptoms of this pandemic. The proposed method is based on adopt
... Show MoreNosocomial infection is acquired contamination of hospitals and health care units caused by multidrug resistant bacteria. Currently, bacterial resistance to antimicrobial medication represents a complicated public health problem. Recent studies on the antimicrobial activity of silver nanoparticles (AgNPs) attracted researchers worldwide to focus on the safe synthesis of AgNPs as antimicrobial agents against multidrug resistant bacteria. The antimicrobial efficacy of AgNPs on pathogenic bacteria isolated from clinical cases of acquired hospital infection was targeted in this project. Fifty specimens of stool were collected through private laboratories in Baghdad from patients who suffered diarrheal symptoms. Bacterial isolation, identific
... Show Moreيهدف البحث ابر تحديد نقاط الاختناق من خلال تحديد القيود التي تعترض عمل الشركة وبالتالي معالجتها من خلال تطبيق خطوات نظرية القيود والتي تمثل اداة فاعلة تساعد في التخلص من نقاط الاختناق وجدولة تلك القيود
تعد مراجعة النظير واحدة من الأســاليب الحديثة فــي مجال الرقابة والتدقيق ونشــأة كأداة لقياس مــدى فاعليــة الرقابــة علــى الجــودة هو لبنة أساسية في إدارة الجودة الشاملة ووسيلة لتحســين أدوات الرقابــة المعمول بها، وللتحقق من مدى الانسجام بين المعايير الدولية للأجهزة العليا للرقابة المالية والمحاسبة والاجراءات المعمول بها من قبل الاجهزة العليا للرقابة وعليه فأن مراجعة النظير أداة تستخدم ف
... Show MoreLet G be a graph with p vertices and q edges and be an injective function, where k is a positive integer. If the induced edge labeling defined by for each is a bijection, then the labeling f is called an odd Fibonacci edge irregular labeling of G. A graph which admits an odd Fibonacci edge irregular labeling is called an odd Fibonacci edge irregular graph. The odd Fibonacci edge irregularity strength ofes(G) is the minimum k for which G admits an odd Fibonacci edge irregular labeling. In this paper, the odd Fibonacci edge irregularity strength for some subdivision graphs and graphs obtained from vertex identification is determined.
Various assays are used to determine the toxic effects of drugs at cellular levels in vitro. One of these methods is the dye exclusion assay, which measures membrane integrity in the presence of Trypan blue. Trypan blue the dye which was used in this study to investigate cytotoxic effect of a new Cis –dichloroplatinum (II) complex [(Qu)2PtCl2] on the viability of polymorphonuclear cells (PMNs). Three concentrations of platinum complex were prepared (70, 35and 17.5 µg/ ml) and the results revealed that the percentage of cell viability decreased as the platinum complex concentration increased in comparison with control.
... Show MoreIn today's world the role of leadership in the control factors of the organization different and advancement, and that the possession of the human ability to the development and creation and innovation varies from one individual to another depending on experience; and levels of performance and intellectual; and his mental and physical and other such factors can create a kind of differentiation between the built humans, and this distinction creates our leaders are able to influence others and have the wisdom and connect active individuals and organizations. as the need for organizations of all sizes and levels of leadership transformation is an urgent need to link the application of the various plans and strategies device which direction
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show More