Preferred Language
Articles
/
jcoeduw-649
Technology Usage in English Language Teaching and Learning: Reality and Dream
...Show More Authors

The aim of the study is to diagnose the real level of technology usage in teaching and learning EFL at university from teachers and students’ viewpoints, and see if it is possible to achieve something of the researchers’ dream - accessing top universities. Two questionnaires have been used to measure the range of technology usage in Colleges of Education for Women, Baghdad and Iraqi Universities, and College of Basic Education. The results have shown that the reality of using technology is still away from the dream. The results have been ascribed to two reasons: The first is the little knowledge of using technology in teaching, and the second is that technology is not included in the curriculum.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Academic Medicine
Academic medicine and science diplomacy: medical education in Iraq
...Show More Authors

Physicians are infrequently selected to serve in the yearlong role of Jefferson Science Fellow (JSF) as senior science advisor for the US Department of State or the United States Agency for International Development. The authors discuss the role of a JSF in promoting “science diplomacy” from the perspective of one alumnus, who sites examples of ongoing, long-term collaborative projects including one focusing on medical education reform in Iraq that would not have been possible without the JSF program. More than 3 decades of political and social unrest, terrorism, the internal displacement of millions of Iraqi citizens, the arrival of Syrian refugees, international sanctions, and the effect of fluctuating oil prices that fund education i

... Show More
Scopus (2)
Scopus
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Pyogenic Discitis in Female after Delivery and Pelvic Surgery
...Show More Authors

Background: Pyogenic discitis most frequently occurs
after home delivery, hemorridectomy, and dilatation and
curettage. Discitis is generally due to blood borne bacterial
invasion of the disc from adjacent end-plate via
communicating vessels. Infective discitis remains an
uncommon, but potentially serious cause for back pain.
Delayed diagnosis can occur and a high index of suspicion
may occur.
Methods: The study included 30 patients suffering from
localized low back pain with limitation of movement.
Diagnosis was made by history, physical examination and
investigation mainly E.S.R and MRI.
Results: 50.3% of patient with discitis had a history of
vaginal delivery, 15% had a history of hemorridectomy

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Engineering
Pilot Based Channel Estimation and Synchronization in OFDM System
...Show More Authors

Channel estimation and synchronization are considered the most challenging issues in Orthogonal Frequency Division Multiplexing (OFDM) system. OFDM is highly affected by synchronization errors that cause reduction in subcarriers orthogonality, leading to significant performance degradation. The synchronization errors cause two issues: Symbol Time Offset (STO), which produces inter symbol interference (ISI) and Carrier Frequency Offset (CFO), which results in inter carrier interference (ICI). The aim of the research is to simulate Comb type pilot based channel estimation for OFDM system showing the effect of pilot numbers on the channel estimation performance and propose a modified estimation method for STO with less numb

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Sep 28 2022
Journal Name
Gsc Advanced Research And Reviews
Distribution and seasonal spread of zooplankton in Iraqi waters
...Show More Authors

A summary of zooplankton research done in Peruvian marine waters is presented. We first provide a brief overview of the evolution of zooplankton studies off Peru before reviewing zooplankton biodiversity, regional distribution, seasonal and interannual fluctuation, trophodynamics, secondary production, and modeling are some of these topics. We evaluate research on various meroplankton, macroplankton, mesoplankton, and microplankton groups and provide a list of species from both published and unpublished sources. Three regional zooplankton groups have been identified: A shelf group on the continental shelf dominated by Acartia tonsa and Centropages brachiatus; A slope group on the continental shelf with siphonophores, bivalves, foramin

... Show More
Preview PDF
Publication Date
Fri May 26 2023
Journal Name
Journal Of Islamic Thought And Civilization
Undermining the Familiar and Embodiment Content in Arabic Calligraphy
...Show More Authors

Contrary to deconstruction and its destructive pursuit, the concept of undermining the familiar seeks to refute the constants and its known limitations. It is done through the process of receiving and what is imposed by the formation of the word or text or the structural and design structure in general, along with the Arabic calligraphy in particular. This is based on the recipient's understanding and interpretation of the dual phenomenon and the content's manifestation. More accurately, the disclosure of its reality through its expressive phenomenology; for that sake, the research was devoted to studying “undermining the familiar and embodiment content in Arabic calligraphy” including four chapters. The first chapter comprised

... Show More
View Publication
Scopus (1)
Crossref (3)
Scopus Crossref
Publication Date
Mon Dec 02 2013
Journal Name
International Journal Of Pharmacy And Pharmaceutical Sciences
Formulation and in vitro evaluation of rosuvastatin calcium niosomes
...Show More Authors

Scopus (29)
Scopus
Publication Date
Wed Jan 01 2025
Journal Name
Scripta Medica
Correlation between psoriasis severity and dyslipidaemia in Iraqi patients
...Show More Authors

Background/Aim: Psoriasis is a persistent systemic disorder characterised by chronic inflammation and linked to multiple comorbidities, including arthritis, cardiometabolic disorders, obesity and hyperlipidaemia. Objective of this study was to identify the relationship of abnormal lipid profiles and psoriasis, as well as to pinpoint factors that correlate with disease severity. Methods: A cross-sectional study was carried out at the dermatology clinic over 6 months from the 1 August 2024 to the 1 February 2025. Patients aged 15 years and above with a diagnosis of psoriasis were enrolled. For each patient two sets of data were collected, demographical characteristics (age, sex, disease duration and the body mass index (BMI)) and the

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (9)
Crossref
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of The College Of Basic Education
Preparation of Chalcones and their Applications in Heterocycles Synthesis
...Show More Authors

Some new heterocyclic compounds containing, cyclohexenone, indazole, isoxazoline, pyrmidine and pyrazoline ring system were prepared from chalcones (1a,b). The starting chalcones (1a,b) were obtained by a base catalyzed condensation of appropriately substituted benzaldehydes and 2-acetylbenzofuran. The reaction of the prepared chalcones with ethylacetoacetate/hydrazine hydrate, hydroxylamine hydrochloride, urea, thiourea, hydrazine hydrate, phenyl hydrazine or hydrazide derivatives gave the mentioned heterocycles. All synthesized compounds have been characterized by physical and spectral methods.

View Publication