Preferred Language
Articles
/
jperc-379
The role of teachers in Sociology In the development of creative thinking for students stage Middle school section of the literary In Karkh II schools From the perspective of the teachers and the students themselves
...Show More Authors

This study aimed identify the teachers of sociology. In the development of creative thinking. I have students in middle school .llvra literary. In schools. Second Karkh From the perspective of the teachers and the students themselves  numbered (41), a teacher and a school. As The study population   encompassed of some students the fourth and fifth preparatory stage in the Karkh II schools, totaling 200 male and female students. As the study sample were consisted of (7) and a teacher (34) and accented (85) of male students (115) were female student The researcher the questionnaire which consisted of (39) items And to achieve the objectives of the study it was ascertained sincerity And stability. And a workout the questionnaire on a sample of (20) a teacher Were analyzed using the kronbach Alpha correlation factor resulting rating of (92.5%)

Results showed as follows:

  1. The teachers and their role in the development of estimates of creative thinking of students Karkh II schools for Everybody scale .The a highly With the exception of clause (6), which was intermediate And the role of teachers in sociology. In the development of creative thinking from the perspective of students. Medium degree
  2. not find statistically significant differences in the response of teachers on the role of teachers In the development of creative thinking of the request According to the study variables While the pointed to find statistically significant differences in the response of students Halldor teachers in the development of creative thinking Among students by sex change in favor of females

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
تجلیات اللغة الایحائیة في دعاء الصباح للامام علي بن ابي طالب (علیھ السلام)
...Show More Authors

The literary aspect of any text reveals when it used The inspiration language
which reveals the creative aspect of language for the creator (writer) he in turn
will seek for the best choice from these aspects then, he will distribute them due
to their intention, and according to the their context
Thus, propagandistic text contains many moral features which the language
accord to thus , we found that the morning (dua al asbah)is full of creative
literary manifestations through many abstentions which happened in different
structures that contain the text, especially in structure of metaphor, and contrast.
we found many outstanding gaps and abstentions in these are given life, matter
that gives the text the most l

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 08 1013
Journal Name
كلية الفنون الجميلة
إشكالية الخطاب الجمالي للجسد في النحت العالمي المعاصر، دراسة على وفق المنهج الظاهراتي
...Show More Authors

اهتم في الربع الأول بالمفاهيم النظرية للمناهج التي تقع في النقاط الخمس ، النقطة الأولى تتعلق بمفهوم الخطاب والخطاب المادي ، وقلنا أن الرسالة كانت مبنية على الجسد من البداية ، حتى قبل ذلك هناك ستكون فلسفة أو معرفة المنظمة. أما النقطة الثانية فتتعلق بالمفهوم الفينومينولوجي للخطاب ، ونحن في هذه المرحلة أهم الركائز التي قام عليها (إدموند هوسرل) في بناء مفهوم وصفي ضعيف. في النقطة الثالثة نكشف عن الظواهر المتعلقة ب

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 12 2018
Journal Name
Arab Science Heritage Journal
المادة المادة السابعة في معاهدة باريس لعام 1856 وموقف الدول الأوربية الكبرى منها
...Show More Authors

            The issue of the survival of the Ottoman Empire during the nineteenth century, a controversial topic in European diplomacy, was what was called the "Eastern Question" containing the fate of this country and its regions sprawling one of the hottest topics in the diplomatic major European powers of that century

View Publication Preview PDF
Publication Date
Tue Jan 05 2010
Journal Name
Political Sciences Journal
بعض الملاحظات على القانون رقم 35 لسنة 2007 قانون العمل الصحفي في كوردستان
...Show More Authors

بعض الملاحظات على القانون رقم 35 لسنة 2007 قانون العمل الصحفي في كوردستان

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 17 2021
Journal Name
Arab Science Heritage Journal
قراءة تحليلية في كتاب الاصول للسيد محمد باقر الصدر واثره على الدراسات المعاصرة.
...Show More Authors

    In the subject area (participation and tandem), the study showed the views of Mr. Sadr in this field when researching first: the issue of the necessity of these two phenomena in the language that some imams of the language and principles called for to discuss and respond to, and

View Publication Preview PDF
Crossref
Publication Date
Wed Sep 04 2024
Journal Name
F1000research
Posterior palatal seal recording: fact and reasons among Iraqi dentists
...Show More Authors

Abstract* Backgrounds The retention of the maxillary complete denture may be influenced by adequate recording in the patient’s mouth, marking, and carving of the post-dam on the maxillary cast. Failure to do so may lead to loss of retention. Successful denture construction with patient’s comfort could be achieved by effective methods of recording, marking, and carving of the post-dam. The aim of the study was to assess Iraqi dentists in their knowledge and application of the post-dam in maxillary complete dentures. Methods Questionnaires were distributed randomly through online Google Forms and 118 Iraqi dentists with different academic degree participated in the study. A multinomial logistic regression model was also used to ass

... Show More
View Publication
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Mar 28 2022
Journal Name
The Open Dentistry Journal
Depression, Anxiety and Stress Among Dentists During COVID-19 Lockdown
...Show More Authors
Introduction:

The objective of this study was to investigate the levels of depression, anxiety, and stress among dentists during covid-19 lockdown and to investigate the relationship between stress and each mental health state.

Methods:

A cross-sectional survey on 269 dentists was conducted using DASS-21 and PHQ-9 questionnaires. Bivariate and multivariate models were constructed and the odds ratio (OR) was calculated to assess the strength of the association between an independent categorical variable and the outcome.

Results and Discussion:

Being unsatisfied with the job was as

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref