The current research aims to identify: 1. The level of mathematical construct among the Department of Mathematics students in the colleges of education and basic education. 2. The level of effective mathematical operations in both sides of the brain at the Department of Mathematics students in the colleges of education and basic education. 3. The strength and direction of the correlation between the mathematical construct and effective mathematical operations on both sides of the brain at the Department of Mathematics students in the colleges of Education and Basic Education. To investigate the research objectives, the researcher formulated zero-main hypothesis for each aim and from the same hypothesis, three sub-zero hypotheses are derived. The current research community has included the fourth-year students (171 subjects) from the departments of mathematics students in the colleges of Education and Basic Education - Misan University (Morning Studies) for the academic year (2015-2016). Because the number of the community is small, the current research has included all fourth-year students in the mathematics department at the colleges of Education and Basic Education - Misan University except the students in the exploratory sample which are (30) subjects, were taken equally from the students of the Department of Mathematics in the two colleges. Therefore, the size of sample was (141) students; (63) students are from the College of Education and (78) students are from the College of Basic Education. The researcher had prepared a test of effective mathematical operations on both sides of the brain is composed of (34) items distributed among three fields. He proved its validity, reliability and to the statistical analysis of its items. He used a template test for mathematical construct, which was used before. He modified some its items linguistically, rearranged some of them and numbered in a different way, and check its validity, reliability and the statistical analysis to its items. The final draft of the test included (36) objective items, (23) multiple- choice items and (7) items of the pairing type (they included 55 sub-items). After the application of the two tools of the research on a sample of research and data analysis, the researcher obtained the following results: 1. The students of research sample have the mathematical construct at the required level. 2. The research sample students have effective mathematical operations on both sides of the brain at the required level. 3. Statistically, there is significant correlation between the mathematical construct and the effective mathematical operations on both sides of the brain among the students of the research sample. Based on the research results, the researcher formulated a number of conclusions, recommendations and suggestions
The combination of wavelet theory and neural networks has lead to the development of wavelet networks. Wavelet networks are feed-forward neural networks using wavelets as activation function. Wavelets networks have been used in classification and identification problems with some success.
In this work we proposed a fuzzy wavenet network (FWN), which learns by common back-propagation algorithm to classify medical images. The library of medical image has been analyzed, first. Second, Two experimental tables’ rules provide an excellent opportunity to test the ability of fuzzy wavenet network due to the high level of information variability often experienced with this type of images.
&n
... Show MoreLet R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be approximately pure submodule of an R-module, if for each ideal I of R. The main purpose of this paper is to study the properties of the following concepts: approximately pure essentialsubmodules, approximately pure closedsubmodules and relative approximately pure complement submodules. We prove that: when an R-module M is an approximately purely extending modules and N be Ap-puresubmodulein M, if M has the Ap-pure intersection property then N is Ap purely extending.
This paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.
The global food supply heavily depends on utilizing fertilizers to meet production goals. The adverse impacts of traditional fertilization practices on the environment have necessitated the exploration of new alternatives in the form of smart fertilizer technologies (SFTs). This review seeks to categorize SFTs, which are slow and controlled-release Fertilizers (SCRFs), nano fertilizers, and biological fertilizers, and describes their operational principles. It examines the environmental implications of conventional fertilizers and outlines the attributes of SFTs that effectively address these concerns. The findings demonstrate a pronounced environmental advantage of SFTs, including enhanced crop yields, minimized nutrient loss, improved nut
... Show MoreConsidering the magnitude of its economic, social and political impact, unemployment represents a crucial challenge confronting the majority of the countries of the world. The problem of the study was the high rates of unemployment in Sudan and the inability of economic growth rates to keep pace with the steady increases in unemployment rates during the study period. This study aimed to identify the economic and social variables influencing unemployment rate in Sudan, in addition to measuring the impact of these variables over the period (1981-2015). Data were collected from databases of the World Bank and Atlas of the World's data .The study hypothesized the presence of statistically significant and direct relationship between u
... Show MoreThis study aimed to extract, purify, and characterize the protease of local Okra Abelmoschus esculentus pods. The extraction process was conducted using ten extraction solutions with different pH and ionic strength values. Phosphate buffer solution with (pH 7, 0.05M, containing 2% sodium chloride) gave the highest activity which was (7.2 Unit/ml) as compared to other solutions, which ranged from 0.8-5.9 Unit/ml. The extracted enzyme purified by several stages. Being, precipitation by gradual addition of Ammonium sulphate from 20 to 85% saturation, then the precipitated enzyme was dialyzed and fractionated through DEAE-Cellulose (22X1.1cm), the enzymic fractions were pooled. The specific activity, purification fold and the enzyme yield value
... Show MoreBackground: DVT is a very common problem with a very serious complications like pulmonary embolism (PE) which carries a high mortality,and many other chronic and annoying complications ( like chronic DVT, post-phlebitic syndrome, and chronic venous insufficiency) ,and it has many risk factors that affect its course, severity ,and response to treatment. Objectives: Most of those risk factors are modifiable, and a better understanding of the relationships between them can be beneficial for better assessment for liable pfatients , prevention of disease, and the effectiveness of our treatment modalities. Male to female ratio was nearly equal , so we didn’t discuss the gender among other risk factors. Type of the study:A cross- secti
This research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreAn aircraft's landing stage involves inherent hazards and problems associated with many factors, such as weather, runway conditions, pilot experiences, etc. The pilot is responsible for selecting the proper landing procedure based on information provided by the landing console operator (LCO). Given the likelihood of human decisions due to errors and biases, creating an intelligent system becomes important to predict accurate decisions. This paper proposes the fuzzy logic method, which intends to handle the uncertainty and ambiguity inherent in the landing phase, providing intelligent decision support to the pilot while reducing the workload of the LCO. The fuzzy system, built using the Mamdani approach in MATLAB software, considers critical
... Show More