Preferred Language
Articles
/
jperc-445
Undesirable behaviors for university students by their instructors view
...Show More Authors

Undesirable behaviors among students  are consider one of the danger problems threating societies and educational and scientific institutions of countries  because its one of the way to express aggression , so the instructors consider one of the most important people could be trust their evaluation and logical view , therefore the present research aimed to :

  1. Recognize undesirable behavior in students of University by the view of their instructors
  2. Measure the level of undesirable behavior in students of university by the view of their instructors
  3. Recognize more common  undesirable behavior in students of University by the view of their instructors
  4. Recognize undesirable behavior in students of University according to , range and percentage
  5. The researcher built scale of undesirable behavior in students of University by the view of their instructors contains from (33) items distributing on three Field (verbal behaviors, motion and group behaviors, the results appears :
  6. the mean sample was (102) degree is higher than hypothetical mean which was (82.5) degree is significantly effect in (5 %)
  7. the most common behaviors are , agreement of group absence , postpone the exam for un logical excuse . while the less common behaviors was , laughing without real reason in class , discussion without respect
  8. undesirable behavior in students of University by the view of their instructors contains underline second level (high) with (54 – 74 ) range because of (32) frequency ratio at 51 % .

According to results ,the researcher concluded with recommendations and suggestions  

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
Nahrwan Clays Study for Brick Industry
...Show More Authors

Nahrawan clay deposits lies in Diyala governorate , 65 Km, NE of Baghdad , according to the previous work in this field, in which they study the reserve belong to category of investigation ( C2 & C1 ) , we choice the proper area to investigation of category (B) with drill net( 200x 200m ) to rise the amount of reserve. The investigation work included drilling (116) boreholes of total depth ranges from (10.0-12.55m) , showed mainly clayey and silty deposits with little sand , and the typical borehole (648) represents all types of sediment in the area , and most of boreholes without sandy deposits , and all of these deposits is Quaternary sediment which is consist of two main sedimentary cycles ( the Pleistocene & Holocene ) . Chemical a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Manufacturing electrolysis cell for hydrogen production
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Adaptive Coded Modulation for OFDM System
...Show More Authors

This paper studies the adaptive coded modulation for coded OFDM system using punctured convolutional code, channel estimation, equalization and SNR estimation. The channel estimation based on block type pilot arrangement is performed by sending pilots at every sub carrier and using this estimation for a specific number of following symbols. Signal to noise ratio is estimated at receiver and then transmitted to the transmitter through feedback channel ,the transmitter according to the estimated SNR select appropriate modulation scheme and coding rate which maintain constant bit error rate
lower than the requested BER. Simulation results show that better performance is confirmed for target bit error rate (BER) of (10-3) as compared to c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Sat Nov 01 2014
Journal Name
I-manager's Journal On Information Technology
AN ENHANCED METHOD FOR SPRITE EXTRACTING
...Show More Authors

The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.

Publication Date
Sun Dec 07 2008
Journal Name
Baghdad Science Journal
Optical Properties for SeTe Thin Films
...Show More Authors

Chalcogenide glasses SeTe have been prepared from the high purity constituent elements .Thin films of SeTe compound have been deposited by thermal evaporation onto glass substrates for different values of film thickness . The effect of varying thickness on the value of the optical gap is reported . The resultant films were in amorphous nature . The transmittance spectra was measured for that films in the wavelength range (400-1100) nm . The energy gap for such films was determined .

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Progress In Electromagnetics Research C
BANDWIDTH OPTIMISATION FOR SEMICONDUCTOR JUNCTION CIRCULATORS
...Show More Authors

View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
Isthmus life and prepare for it
...Show More Authors

Isthmus life and prepare for it

View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Iraqi Journal Of Physics
Wavelet compression for remotely sensed images
...Show More Authors

Image compression is very important in reducing the costs of data storage transmission in relatively slow channels. Wavelet transform has received significant attention because their multiresolution decomposition that allows efficient image analysis. This paper attempts to give an understanding of the wavelet transform using two more popular examples for wavelet transform, Haar and Daubechies techniques, and make compression between their effects on the image compression.

View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Lecture Notes In Electrical Engineering
Prosthetic Parts for Protecting Mobile Robots
...Show More Authors

View Publication
Scopus Crossref