Find out the leadership ability among female university students.
The researcher made aquestionnaire consisting ofone open question for (50) female students of education college for women\ Baghdad university to mention main leadership abilities with leader student.
To achieve the aims of this study, the researcher made the following steps: 1- Collection and finalization the items of the scale Through literature review and previous studies and aquestionnaire consisting where (3) items have been extracted to make this questionnaire. 2- The test has been submitted to proffesionals of psychology to judge the valiidety of items of the scale where their opinion was they are good at (100%).The scale has been applied on statistical analysis sample consisting of (300) femal students of the 3rd and 4th grade in the following universities (Baghdad, Al- Mustansiriha, Al- Nharin) in Baghdad for the academic year (2015-2016). 4- Statistical analysis for the items (discrimination, validity of items).
5- Some psychometric properties were conduced:
The face validity.
Reliability: Cronbach's alpha was used and the reliability score was (0,75). 6- After the results of statistical analysis for the scale and constancy and validity has been extracted, the researcher eliminated the where (3)items has been eliminated out of (30) items and kepton dicrimnative and statisticaly significant ones leading to the final scale consisting of (27) items. 7- The scale with its final form has been applied on (700) female students from the 3rd and 4th grade in the following universities (Baghdad, Al- Mustansiriha, Al- Nharin) in Baghdad for the academic year (2015-2016). 8- After the process of separation of answers, T-test has been applied on one sample, and the results showed that there were statisticaly signifigant differences at (0,05) level in the ability of femal students in leading where the calculated T- value was (117,35) which was larger than schudeled T- value which was (1,96) and the level of leadership ability among female university students was high. 9- The researcher concluded with anumber of suggestion and recommendations.
BACKGROUND: Hospital training courses for pharmacy students were required to prepare students to meet the challenges of real-world hospital work. AIM: Because there have been few studies on the efficacy of such courses, we aimed to recognize recent graduates’ perceptions, benefits, and factors influencing the quality of hospital training courses for pharmacy students. METHODS: A qualitative study using a phenomenology approach was conducted in 2022 and included several hospitals in Baghdad, Iraq, using in-depth face-to-face individual-based semi-structured interviews. Until saturation, a convenient sample of recently graduated pharmacists was included. The obtained data were analyzed using a thematic content analysis approach
... Show MoreSummary The objective of the research is to learn the design of a learning educational learning according to the theory of Ausubel in the acquisition of geographical concepts among the students of the fourth primary in the field of geography and the development of their habits of mind. To achieve this, the researcher relied on the two hypotheses the researcher used the design of equal groups the first experimental group was studied according to the design educational educational learning according to the theory and the other is an officer according to the traditional method. The research community consists of fourth grade pupils in primary school day for girls in the Directorate of Education Baghdad, Al-Rusafa, the third academic year 20
... Show MoreThis research aims at identifying the system of applying the QRcode system for acquisition of chemistry by first class female students studying at intermediate schools knowledge and its effect on creative thinking. The research sample consisted of (63) female students in one of the intermediate schools in Baghdad/Iraq using two equivalents experimental and control groups. The scientific context used was based on the chemistry text book related to the periodic table, (Metals) for the first group of students and Alkaline metals,Nonmetals, Metalloides) for the second group. The research methodology employed consisted of the followings :Measuring students acquisition using (35) issues. The results were verified for their face validity and obtai
... Show MoreExogenous levothyroxine dose modulation and euthyroidism achievement is a persistent challenge in clinical settings. This study strives to assess the adequacy of treatment and identify the patients’ factors that can be used to estimate the euthyroid levothyroxine dose. A secondary objective was to assess vitamin D supplementation impact on thyroid status.
A review of a prospectively collected information from 142 female patients from Baghdad Center of Nuclear Medicine from June 2019 until March 2020 who were receiving levothyroxine for different causes was done. After a follow-up period, the patients’ thyroid tests were assessed and the euthyroid doses for each cause category were statistically analyzed. Thyroid function was
... Show MoreThe university course timetable problem (UCTP) is typically a combinatorial optimization problem. Manually achieving a useful timetable requires many days of effort, and the results are still unsatisfactory. unsatisfactory. Various states of art methods (heuristic, meta-heuristic) are used to satisfactorily solve UCTP. However, these approaches typically represent the instance-specific solutions. The hyper-heuristic framework adequately addresses this complex problem. This research proposed Particle Swarm Optimizer-based Hyper Heuristic (HH PSO) to solve UCTP efficiently. PSO is used as a higher-level method that selects low-level heuristics (LLH) sequence which further generates an optimal solution. The proposed a
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.