The research aims at identifying the importance of scientific research for researchers and in creating new knowledge، development and utilization of mental and cognitive energies and developed them with the ability to research، extrapolation، meditation and then conclusion. The information was collected by interviewing the Secretary-General of the Central Library and by distributing questionnaire forms to the (33) teaching staff of the College of Higher Education. The responses of the society were analyzed the result and the recommendations were the most important 1. Information specialist and all employees of the administrators and technicians in the centers of information sources (libraries) and in the field are considered scientific r
... Show MoreThe study aimed to identify the news framing on the Israeli Arabic-speaking i24 channel of the Israeli aggression on Gaza -2021 by analyzing the channel’s Program “this evening”. The study used the media survey method, and in its framework, it relied on the content analysis method for the program’s episodes from May 5, 2021 AD until June 4, 2021 AD, with 22 episodes. The study showed the program’s interest in launching the Palestinian resistance’s rockets significantly, followed by the Israeli military operations, and the program’s reliance on correspondents largely as a source of news material related to the aggression. It also proved that a news report and a reporter's report was the most important form of presenting news
... Show MoreRecommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n
... Show MoreThis paper presents a numerical simulation of the flow around elliptic groynes by using CFD software. The flow was simulated in a flume with 4m long, 0.4m wide, and 0.175m high with a constant bed slope. Moreover, the first Groyne placed at 1m from the flow inlet with a constant the Groyne height of 10cm and a 1cm thickness, and the width of Groynes equals 7cm. A submergence ratio of the elliptic Groynes of 75% was assumed, corresponding to a discharge of 0.0057m3/sec. The CFD model showed a good ability to simulate the flow around Groynes with good accuracy. The results of CFD software showed that when using double elliptic Groy
... Show MoreThe uses of traditional plant extract in the treatment of various diseases have been flourished. The present study, IJSR, Call for Papers, Online Journal
The mobile phone has become one of the most important in our days. The effects of waves from mobile base station may cause health effects on human. The aim of this work was to study the effect of radiofrequency (RF) emitted from mobile base station on the hemoglobin (Hb), packed cell (PCV), white blood cells (WBC) and liver enzymes activity including glutamic oxaloacetic transaminase (GOT), glutamic pyruvie transaminase (GPT) and Alkaline phosphatase (ALP). In this study the people divided into control group who living away from mobile base station and experimental group who living near to the mobile base station. The present result found there is no significant differences (P<0.05) in the Hb and PCV, but there was a significant increases (
... Show MoreThe research aims at identifying the extent to which the top management in the organization is interested in managing the talents of its employees, through which it can face the competing organizations, as well as the great challenges faced by all organizations in recent years. The task of attracting and maintaining talented human resources is one of the biggest challenges facing Organizations
... Show More
Objective This study aims to investigate the impact of integrated training on kinematics variables and defensive accuracy in volleyball, focusing on enhancing balance and muscle tension control through proprioceptive neuromuscular facilitation (PNF) exercises. Methods The sample consisted of 14 male volleyball athletes from the first volleyball league of Al-Jaish Sports Club were divided into experimental (n=7) and control group (n=7). In the pre- and post-intervention periods, dynamic balance, muscle tension control and kinematic variables (during a lateral reaching task) as well as defensive performance accuracy upon fatigue onset of recoil laser strikes were assessed. Exposure the intervention program was carried out for six weeks, and t
... Show MoreScrophularia. striata from Scrophulariacea family has been used in Iranian folk medicine for the treatment of infectious diseases. In this study we evaluated the synergistic effect of S. striata hydroalcoholic extract (SSE) and commercially available antibiotics against P. aeroginosa and Methicillin- resistant Staphylococcus aureus (MRSA). The resazurin-based microdilution method was used to determine the minimum inhibitory concentration (MIC) values of plan extract and standard antibiotics. The interaction between standard antibiotics and SSE was evaluated by using checkerboard method. The results of this study revealed that SSE enhance the antibacterial activity of antibiotics. The combin
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More