--The objective of the current research is to identify: 1) Preparing a scale level for e-learning applications, 2) What is the relationship between the applications of e-learning and the students of the Department of Chemistry at the Faculty of Education for Pure Sciences/ Ibn Al-Haytham – University of Baghdad. To achieve the research objectives, the researcher used the descriptive approach because of its suitability to the nature of the study objectives. The researcher built a scale for e-learning applications that consists of (40) items on the five-point Likrat scale (I agree, strongly agree, neutral, disagree, strongly disagree). He also adopted the scale of scientific values, and it consists of (40) items on a five-point scale as well. The sample consisted of (200) male and female students from the Department of Chemistry at the Faculty of Education for Pure Sciences/ Ibn Al-Haytham - Phase Four – Morning Study. The psychometric properties of the instruments were verified from face and structure validity and Reliability in a manner of internal consistency, and the researcher used the following statistical means: (T-test of one sample, T-test of two independent samples, Chi-squared test, Pearson correlation coefficient, equation of Cronbach’s alpha). The researcher reached the following results: 1) The large number of students of the Department of Chemistry at the Faculty of Education for Pure Sciences/ Ibn Al-Haytham who are using e-learning applications, 2) There is a strong correlation and direct relationship between the applications of e-learning and the students of the Chemistry Department. The significance of e-learning applications, their relationship and their significant and effective role in the development of these important applications has been discussed in this research among the students of the Department of Chemistry at the Faculty of Education for Pure Sciences – Ibn Al-Haytham
This research discussed, the process of comparison between the regression model of partial least squares and tree regression, where these models included two types of statistical methods represented by the first type "parameter statistics" of the partial least squares, which is adopted when the number of variables is greater than the number of observations and also when the number of observations larger than the number of variables, the second type is the "nonparametric statistic" represented by tree regression, which is the division of data in a hierarchical way. The regression models for the two models were estimated, and then the comparison between them, where the comparison between these methods was according to a Mean Square
... Show MoreSeveral previous investigations and studies utilized silica fume (SF) or (micro silica) particles as supplementary cementitious material added as a substitute to cement-based mortars and their effect on the overall properties, especially on physical properties, strength properties, and mechanical properties. This study investigated the impact of the inclusion of silica fume (SF) particles on the residual compressive strengths and microstructure properties of cement-based mortars exposed to severe conditions of elevated temperatures. The prepared specimens were tested and subjected to 25, 250, 450, 600, and 900 °C. Their residual compressive strengths and microstructure were evaluated and compared with control samples (C
... Show MoreThe risk of significant concern is resistance to antibiotics for public health. The alternative treatment of metallic nanoparticles (NPs), such as heavy metals, effects on antibiotic resistance bacteria with different types of antibiotics of - impossible to treat using noval eco-friendly synthesis technique nanoparticles copper oxide (CuO NPs) preparation from S. epidermidis showed remarkable antimicrobial activity against S.aureus Minimum inhibitory concentra range (16,32,64,256,512) µg/ml via well diffusion method in vitro, discover those concentrations effected in those bacteria and the best concentration is 64 µg/ml, characterization CuO NPs to prove this included atomic force microscope, UV, X-ray Diffraction and TEM, and ant
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreAbstract Introduction: MMP3 plays a crucial role in the process of bone erosion in the pathomechanism of rheumatoid arthritis (RA). It acts by removing the outer osteoid layer, which allows the osteoclasts to tightly connect and carry out the subsequent damage to the underlying bone. MMP3 can trigger the production of other MMPs like MMP-1, MMP-7, and MMP-9, it plays a pivotal role in the remodeling of connective tissues. Aim of the study: to assess the influence of MMP-3 serum levels and single-nucleotide polymorphisms of rs679620 in the rheumatoid arthritis patients' group in comparison to the control group. Subjects: eighty eight samples, 45 rheumatoid arthritis patients after being referred by their treating physician for regular RA
... Show MoreProtecting information sent through insecure internet channels is a significant challenge facing researchers. In this paper, we present a novel method for image data encryption that combines chaotic maps with linear feedback shift registers in two stages. In the first stage, the image is divided into two parts. Then, the locations of the pixels of each part are redistributed through the random numbers key, which is generated using linear feedback shift registers. The second stage includes segmenting the image into the three primary colors red, green, and blue (RGB); then, the data for each color is encrypted through one of three keys that are generated using three-dimensional chaotic maps. Many statistical tests (entropy, peak signa
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show More