The Political loyalties of the individual considered as the most important democracies through direct psychological identification in a particular party. The political parties regarded as the important elements and the foundations of the democratic system. They have effective interaction between the voters and the government institutions. The aim of the current research is to identify the quality of Islamic, the Civilian parties, and the most preferred for students. also, the research attempt to identify the level of identification party that the university students have, and the difference of identification party according to the gender (male, female), the difference of of social class (upper, middle, poor). The sample of the research included (587) male and female students from Al-Mustanisiriya University. The researchers have designed a scale to measure the identification party. The conclusion of the research is that the students of the university prefer the Civilian parties to the Islamic parties, the sample of the research of the identification party is low،, there is no difference in identification party between male and female, but the difference in identification party is according to the level of the social class. The researchers provide many recommendations according to the result, in addition, provide many examples relate to the study of topic of the research.
Background: Body image is one of the most important psychological factors that affects adolescents’ personality and behavior. Body image can be defined as the person’s perceptions, thoughts, and feelings about his or her body.
Objectives: to identify the prevalence of body image concerns among secondary school students and its relation to different factors.
Subjects and methods: A cross-sectional study conducted in which 796 secondary school students participated and body shape concerns was investigated using the body shape questionnaire (BSQ-34).
Results: The prevalence of moderate/marked concern was (21.6%). Moderate/ marked body shape concern was significantly associated
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
The research started from the basic objective of tracking the reality of organizational excellence in educational organizations on the basis of practical application. The research in its methodology was based on the examination of organizational excellence in the way of evaluating institutional performance. Tikrit University was selected as a case study to study the reality of application to the dimensions of organizational excellence in it, The results of the analysis for ten periods during the year and month. For the accuracy of the test and its averages, it was preferable to use the T test to determine the significance of the results compared to the basic criteria.
The research found that there is an o
... Show MoreThe university course timetable problem (UCTP) is typically a combinatorial optimization problem. Manually achieving a useful timetable requires many days of effort, and the results are still unsatisfactory. unsatisfactory. Various states of art methods (heuristic, meta-heuristic) are used to satisfactorily solve UCTP. However, these approaches typically represent the instance-specific solutions. The hyper-heuristic framework adequately addresses this complex problem. This research proposed Particle Swarm Optimizer-based Hyper Heuristic (HH PSO) to solve UCTP efficiently. PSO is used as a higher-level method that selects low-level heuristics (LLH) sequence which further generates an optimal solution. The proposed a
... Show MoreInformation security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo
IRA Dawood, JOURNAL OF SPORT SCIENCES, 2016 - Cited by 3
The study focuses on Kamez model and the Claus Meyer model of instructional design, which are models that provide the learner with educational experiences to suit the logical information of the learner and the variety of instructional models. Research Objective: The present research aims to identify Limitations of the study. The current research is determined by ((fourth grade preparatory students, the book of the date of the fourth preparatory course)) Chapter II includes Arabic and foreign studies on the model of Kemp and Claus Mayer in the acquisition of concepts and direction towards the material. Chapter III Experimental Design: The researcher adopted an experimental design with two experimental groups and a control group. The resea
... Show MoreAbstract
This study aims to identify the most prominent factors that lead to bullying of students with intellectual disabilities in primary and middle schools from the perspectives of special education teachers. A quantitative descriptive approach was utilized. A questionnaire was used as a tool for data collection. The sample consisted of (72) male and female teachers from the Asir region in the Kingdom of Saudi Arabia. The results revealed the most prominent factors that lead to bullying as follows: factors associated with the school and its policies, factors associated with peers, factors associated with students with intellectual disabilities, and factors associated with general education teachers. The findin
... Show MoreThe aim of this research is to identify the effect of Webinar technique on digital culture in the College of Education for pure sciences at Ibin Haitham, University of Baghdad. The research samples consisted of (68) male and female students from the Chemistry Department who are following classes during the (2019- 2020) academic year. The samples represent (42%) of the total number of (162) students split into control and experimental groups. For this purpose, the scientific contents for testing were determined. The experimental part is based on analysis of the results from experiments in (preliminary standard solutions, refractive index, Beer-Lambert law). To achieve the aim of the research in testing the measure of student's digital cultur
... Show More