Collaborative learning in class‐based teaching presents a challenge for a tutor to ensure every group and individual student has the best learning experience. We present Group Tagging, a web application that supports reflection on collaborative, group‐based classroom activities. Group Tagging provides students with an opportunity to record important moments within the class‐based group work and enables reflection on and promotion of professional skills such as communication, collaboration and critical thinking. After class, students use the tagged clips to create short videos showcasing their group work activities, which can later be reviewed by the teacher. We report on a deployment of Group Tagging in an undergraduate Computing Science class with 48 students over a semester. Through our analysis of interviews and log data, we show that Group Tagging helped the students remain attentive and on‐task during group work, and encouraged them to participate more during group activities.
This research aims to clarify the advantages of using the regression method as analytical procedure in the tax audit to reducing the examination cost , time, effort, human and material resources, and represents an applied study in the General Commission of taxes. In order to achieve its objectives the research has used in the theoretical side the descriptive approach (analytical), and in the practical side regression method has been applied to the research sample represented by the soft drinks company that is subject to the tax settlement for the year 2014, where the value of sales has been verified by using the regression method without conductinga comprehensive examination. The most important results of the research indicate that the r
... Show MoreAlthough rare, coarctation of aorta is a treatable cause of hypertension, transcatheter dilatation by balloon with or without stent are a well-known treatment strategy
The current paper was designed to find the possible synergic effect of EBV infection with the HPV-16 in Iraqi women suffering from cervical carcinoma. This retrospective study involved paraffinized blocks of two groups. The research included 30 carcinomatous cervical tissues and 15 samples from normal cervical biopsies. After sectioning using positively charged slides, immunohistochemistry (IHC) was performed to detect anti-Epstein Barr Virus LMP1 and Human papillomavirus type 16 primary antibodies. Sixty-three percentage (19 out of 30) of the studies group showed positive overexpression as shown in with a significant association of the expression with cervical cancer with a significant association (p = 0). The co-infection of the EBV and H
... Show MoreM(II) Ions using amino acid L- proline as a primary ligand and either Nicotinamide or 8- hydroxyqinoline as secondary ligand, respectively: a. The mixed ligand complexes of composition,[M(pro)2(na)2]. b. The mixed ligand complexes of composition , Na[M(pro)2(Q)]. Where proline (C5H9NO2) symbolized as pro H , Nicotinamide (C6H6N2O) symbolized as (NA) , 8- hydroxyqinoline, (C9H7NO2) symbolized as (8-HQ). The ligands and the metal chlorides were brought into reaction at room temperature (37ºc) in ethanol as solvent .The reaction required the following molar ratios [(1:2:2) metal:2NA:2pro-] and [(1:1:2) metal:Q:2pro-] with M+2 ions, where M = [Mn (II), Co(II), Ni(II), Cu(II), Zn(II), Cd(II) and pd(II)]. Products were found to be solid crystall
... Show MoreBackground: Thalassemia is characterized by the decrease or absence of the synthesis of one or more globin chains of hemoglobin. Thalassemia is distributed worldwide and is characterized by; regular blood transfusion which is creating alloimmunization to erythrocyte antigens is one of the major complications of regular blood transfusions in thalassemia, particularly in patients who are chronically transfused.Objectives: The aims of this study are to understand the immune system profile as the triggering factor for thalassemia.Methods: Thirty patients aging between one year and four months and twenty two years, twenty two of them were boys and eight were girls. Twenty nine patients, their parents are relative except one and studied in the
... Show MoreBackground: percutaneous balloon dilation of corotation of aorta is a less invasive and alternative to surgical repair for patients with discrete coaction of aorta and although the used of balloon angioplasty in patients with recurrent postoperative coarctation gained a wide consensus, the use this technique for native coarctation is still controversial in children less one years.
Objective: to evaluate the immediate and late result of balloon dilation of native coarctation of aorta in infant and children.
Type of the study: A prospective study.
Subjects & Methods: The study was done on forty-five patients who were referred for cardiac catheterization and balloon
... Show MoreBackground: Oral health represents an important base for human well-being; the heath of the body begins from oral cavity. Great deal has been applied to increase knowledge in the field of oral health in order to develop appropriate preventive program. This study was conducted in order to estimate the percentage and severity of dental caries and gingivitis among children attending Preventive Department in Collage of Dentistry, University of Baghdad and to determine dental treatment need for those patients, further more to study the relation of these variables with dental knowledge. Materials and Methods: The study group consists of 163 children with an age ranged from 6 to 14 years, who attended the preventive clinic for the first time to be
... Show MoreThe type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No
... Show More