Preferred Language
Articles
/
jperc-171
Self-image addiction (Salafi) and its relation to narcissistic personality disorder among students
...Show More Authors

Abstract The goal of current study was to identify the relationship between addiction of self-images (Selfie) and personality disorder of narcissus, and the difference of significance the relationship between addiction self-images (selfie) and personality disorder narcissus at students of Mustansiriya university, addiction self- images (selfie) defined: a photograph that one has taken of oneself, typically one taken with a smartphone or webcam and shared via social media, edit and down lowed to social networking sites, and over time, the replacement of normal life virtual world, which is accompanied by a lack of a sense of time, and the formation of repeated patterns increase the risk of social and personal problems. To achieve the goals of current study, the researcher building two scales, first to identify the addiction of self-image, second and personality disorder of narcissus, the participants were (400) students from Al-Mustansiriya University. The results of current study were the significant statistically correlation between addiction self-images (selfie) and narcissistic personality disorder. The current study has reached a number of future study and recommendations.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Aug 25 2020
Journal Name
Journal Of Clinical Medicine
Self-Limiting versus Rotary Subjective Carious Tissue Removal: A Randomized Controlled Clinical Trial—2-Year Results
...Show More Authors

Background: the aim of this study was to assess the 2-year pulp survival of deep carious lesions in teeth excavated using a self-limiting protocol in a single-blind randomized controlled clinical trial. Methods: At baseline, 101 teeth with deep carious lesions in 86 patients were excavated randomly using self-limiting or control protocols. Standardized clinical examination and periapical radiographs of teeth were performed after 1- and 2-year follow-ups (REC 14/LO/0880). Results: During the 2-year period of the study, 24 teeth failed (16 and 8 at T12 and T24, respectively). Final analysis shows that 39/63 (61.9%) of teeth were deemed successful (16/33 (48.4%) and 23/30 (76.6%) in the control and experimental groups, respectively wit

... Show More
View Publication
Scopus (8)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Wed Jan 16 2019
Journal Name
Applied Physics A
Detecting the thermoplasmonic effect using ellipsometry parameters for self-assembled gold nanoparticles within a polydimethylsiloxane matrix
...Show More Authors

View Publication
Scopus (13)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Journal Of The Sixth Conference Of The Faculty Of Languages
Utilizing Computers for Developing Students Skills
...Show More Authors

NAA Mustafa, Journal of the Sixth Conference of the Faculty of Languages, 2010

View Publication
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of Baghdad College Of Dentistry
Canine malposition in Iraqi dental students
...Show More Authors

Background: This study aims to assess the prevalence of malposed canines among students of College of Dentistry/ University of Baghdad and evaluate the relation between canine malposition and occlusal features.

Material and method: The prevalence of buccally malposed canines was estimated by intra-oral visual examination of 250 young adult subjects (106 males and 144 females), their ages were between 19-24 years.

Results: The prevalence of the mandibular malposed canine (12%) was higher than the maxillary buccally malposed canine (10%). Generally, malposed canines were found higher in f

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Sep 18 2018
Journal Name
Kant
SOME METHODOLOGICAL OF LEARNING TENNIS STUDENTS
...Show More Authors

This study is due to insufficient development of the issues of initial training in tennis at youthful (student) age. Objective: development of a methodological and scientific-methodological base of students' tennis with current trends in tennis. Summing up the best practices of modern tennis, we came to the conclusion that the formation of the art of reflection backhands in teaching beginner students of sports specialization to achieve future success. In modern conditions in the development of Russian tennis student opens the possibility of using new technologies and programs. Using these approaches, we have developed a training program and tested students' tennis in the pedagogical experiment, which resulted in its effectiveness.

Publication Date
Wed Sep 11 2024
Journal Name
Edelweiss Applied Science And Technology
The effectiveness of a proposed strategy according to the Fraunhofer model of knowledge management in the achievement of second intermediate female students in mathematics
...Show More Authors

The goal of the research is to identify the effectiveness of using a proposed strategy according to the Fraunhofer model of knowledge management in mathematics achievement for second-grade female students in middle and high schools affiliated with the General Directorate of Education in Baghdad / Al-Karkh II. The objective was to prove the following null hypothesis: "The average scores of the experimental group who will study with the proposed strategy according to the Fraunhofer model and the scores of the control group students who will study in the usual way in the mathematics achievement test are not statistically significant different at the significance level (0.05)." The General Directorate of Education of Baghdad / Al-Karkh

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Educational And Psychological Researches
The degree of using electronic educational alternatives in education from the teachers 'and female teachers' point of view Intermediate stage in southern border schools and its relationship to some variables
...Show More Authors

The aim of the current research is to know the degree to which middle school teachers and female teachers in the southern border schools use electronic educational alternatives in the field of education from their point of view and its relationship to some variables, and to achieve this goal, a random sample of (200) teachers was selected in southern border schools, and a questionnaire was prepared to collect The data, as well as the descriptive approach was used to achieve this goal. T-test and analysis of variance were used for the statistical treatment. The results concluded that the educational courses provided to male and female teachers are not sufficient. It has also been concluded that the use of electronic educational alternativ

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Modern Sport
Special exercises according to the Dynafoot data and its effect on the force index and the performance of the front straight air flip skill on the ground movements mat device
...Show More Authors

View Publication
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A General Overview on the Categories of Image Features Extraction Techniques: A Survey
...Show More Authors

In the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.

View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More