Preferred Language
Articles
/
hRaKXIoBVTCNdQwCfpwq
E-learning applications and their significance among students of the Department of Chemistry in the Faculty of Education for Pure Sciences – Ibn Al-Haytham
...Show More Authors

--The objective of the current research is to identify: 1) Preparing a scale level for e-learning applications, 2) What is the relationship between the applications of e-learning and the students of the Department of Chemistry at the Faculty of Education for Pure Sciences/ Ibn Al-Haytham – University of Baghdad. To achieve the research objectives, the researcher used the descriptive approach because of its suitability to the nature of the study objectives. The researcher built a scale for e-learning applications that consists of (40) items on the five-point Likrat scale (I agree, strongly agree, neutral, disagree, strongly disagree). He also adopted the scale of scientific values, and it consists of (40) items on a five-point scale as well. The sample consisted of (200) male and female students from the Department of Chemistry at the Faculty of Education for Pure Sciences/ Ibn Al-Haytham - Phase Four – Morning Study. The psychometric properties of the instruments were verified from face and structure validity and Reliability in a manner of internal consistency, and the researcher used the following statistical means: (T-test of one sample, T-test of two independent samples, Chi-squared test, Pearson correlation coefficient, equation of Cronbach’s alpha). The researcher reached the following results: 1) The large number of students of the Department of Chemistry at the Faculty of Education for Pure Sciences/ Ibn Al-Haytham who are using e-learning applications, 2) There is a strong correlation and direct relationship between the applications of e-learning and the students of the Chemistry Department. The significance of e-learning applications, their relationship and their significant and effective role in the development of these important applications has been discussed in this research among the students of the Department of Chemistry at the Faculty of Education for Pure Sciences – Ibn Al-Haytham

Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
Attitudes and policies toward Turgut Ozal issue Kurdish 1984-1993
...Show More Authors

After receipt of military commanders power in 1980, they were determined to solve the
Kurdish question by force, just like their predecessors in resolving such issues, and the
situation became worse when the Kurdish resistance in a more organized than previous years
and behind the Party (PKK) .
After the mass support of the Kurdish widespread party get involved most of the Kurdish
youth in the party organization of the (PKK), prompting Turkish President then to make
decisions and take immediate action firm against the party, but the Kurdish issue began
Tthlhal when he arrived at the helm of President Turgut Ozal in 1989, he worked on the
development of the areas inhabited by the Kurds, specifically the Southeast A

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Feb 20 2024
Journal Name
Baghdad Science Journal
Some Results about Acts over Monoid and Bounded Linear Operators
...Show More Authors

This study delves into the properties of the associated act V over the monoid S of sinshT. It examines the relationship between faithful, finitely generated, and separated acts, as well as their connections to one-to-one and onto operators. Additionally, the correlation between acts over a monoid and modules over a ring is explored. Specifically, it is established that  functions as an act over S if and only if  functions as module, where T represents a nilpotent operator. Furthermore, it is proved that when T is onto operator and  is finitely generated, is guaranteed to be finite-dimensional. Prove that for any bounded operator the following,  is acting over S if and only if  is a module where T is a nilpotent operator, is a

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Dorsal hand veins features extraction and recognition by correlation coefficient
...Show More Authors

View Publication
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Research Journal Of Pharmacy And Technology
Bacteriological and molecular study on S. Aureus bacteria Atala, M.L.
...Show More Authors

Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Computer aided photographic memory enhancement and speed reading (case study)
...Show More Authors

This work aimed to design and testing of a computer program – based eyeQ improvement, photographic memory enhancement, and speed reading to match the reading speed 150 – 250 word per minute (WPM) with the mind ability of processing and eye snap shooting 5000WPM . The package designed based on Visual Basic 6. The efficiency of the designed program was tested on a 10 persons with different levels of education and ages and the results show an increase in their reading speed of approximately 25% in the first month of training with noticeable enhancement in the memory as well as an increase in the ability to read for longer time without feeling nerves or boring, a nonlinear continuously increase in reading speed is assured after the first mo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2009
Journal Name
Ibn Al– Haitham Journal For Pure And Applied Science
Some Results on Fibrewise Lindelöf and Locally Lindelöf Topological Spaces
...Show More Authors

In this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise Lindelöf and locally Lindelöf topological spaces, which are generalizations of will-known concepts: Lindelöf topological space (1) "A topological space X is called a Lindelöf space if for every open cover of X has a countable subcover" and locally Lindelöf topological space (1) "A topological space X is called a locally Lindelöf space if for every point x in X, there exist a nbd U of x such that the closure of U in X is Lindelöf space". Either the new concepts are: "A fibrewise topological space X over B is called a fibrewise Lindelöf if the projection function p : X→B is Lindelöf" and "The fibrewise topological space X over B

... Show More
Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Indian Journal Of Public Health Research & Development
Anterior Loop Presence and Extension Using Cone-Beam Computed Tomography
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of Engineering
CFD Application on Shell and Double Concentric Tube Heat Exchanger
...Show More Authors

This work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).

Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors.  The RNG k-ε model of turbulence is used to determining the accurate results from CFD.

The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o

... Show More
View Publication Preview PDF
Crossref (3)
Crossref