The research aims to know the availability of supra-cognitive thinking skills in the questions and activities of the computer book for the fifth grade preparatory scientific and literary branches in Iraq for the academic year 2018/2019, as the researcher has prepared a list of supra-cognitive thinking skills included two areas and (6) key skills and (27) A sub - skill, where by the questions and activities of the aforementioned authors were analyzed. The researcher followed the descriptive analytical approach "method of content analysis", and adopted the explicit and implicit unit of analysis, as was verified the validity and stability of the analysis, and the results showed unevenness and imbalance in the distribution of supra-cognitive thinking skills in the evaluation questions and activities contained in the book, where it focused on ( Concept Awareness Skill) significantly relative to other skills and omission of many skills (giving reasoning, strategic switching skill, context optimization skill, problem solving skill, re-planning skill, product modification skill, process manipulation skill, thinking organizing skill) Of relevance, then The researcher presented a number of recommendations and suggestions according to the research findings.
Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo
The present article discusses the synthesis of tetradentate Schiff base complexes formed by the condensation reaction of 2-hydroxy benzaldehyde and phthalohydrazide. The ligand (LH2) was detected using FT-IR spectra, 1H, 13C-NMR, UV-Vis spectroscopy, elemental microanalysis CHN, and mass spectrometry. The obtained solid complexes have been assessed using physicochemical and spectroscopic techniques, including UV-Vis, FT-IR, nuclear magnetic resonance (1H-NMR, 13C-NMR), mass spectrometry, thermal gravimetric analysis (TGA), and atomic absorption, in addition to complex conductivity and magnetic moment measurements. The infrared results demonstrated that ligands functioning as tetradentate ligands are chelated to metal ions via the ph
... Show MoreTetradentate bidentate Schiff base (L1) from 4-amino-1.5-dimethyl-2-phenyl-1.2-dihydropyrazol-3-one and 2-(1H-indol-3-yl)-ethylamine and benzene-1.4-dicarbaldehyde was synthesized and characterized as novel antioxidants. The Schiff base and its metal complexes Mn(II), Co(II),Cu(II), Zn(II), Cd(II) and Re(V) have been characterized by elemental microanalysis, metal content, chloride-containing, molar conductance, FT-IR, 1H-NMR, UVVis spectroscopy, magnetic susceptibility, mass spectra (MS), and thermal analysis (TGA). The structures of the prepared compounds were observed by antioxidant activities of the Schiff bases derivatives were investigated due to the imine group (-C=N-) and promising results were obtained. The results confirmed that c
... Show MoreObjective: This study involved the synthesis of new Schiff bases and 1,3-oxazepine derivatives from the baclofen drug and study the anticancer activities. Methods: Baclofen was initially reacted with aromatic aldehydes to create Schiff base derivatives (Ia–Ib), which were then closed in the next step using anhydrous acids to form oxazepine derivatives (IIa–IId). Results: The title compounds were synthesized successfully and identified using FT-IR, 1H NMR, and 13C NMR spectroscopy. Additionally, compound (IIc)’s (3-(4-chloro-phenyl)-4-[2-(4nitro-phenyl)-4,7-dioxo-4,7-dihydro-[1,3] oxazepin-3-yl]butyric acid) anticancer activity was assessed using MTT assay against FTC-133 (thyroid cancer) compared with WRL-68 (normal cell line). Discus
... Show MoreGlobal date palm production is steadily increasing and adopting technologies such as unmanned aerial vehicles (UAVs) and deep learning can reduce costs, save time, and improve productivity. To address this issue, the authors have proposed an innovative approach that uses UAVs for high-resolution aerial imaging. These images, collected by the Department of Computer Engineering at Al-Salam University in Baghdad and the Institute of Machine Design, Faculty of Mechanical Engineering, Poznan University of Technology, support improved orchard management, palm counting, and yield estimation. Precise spraying and pollination are also facilitated and accelerated, reducing overall cultivation costs. The proposed methodology involves processing captur
... Show MoreThe aim of this study is to compare the effects of three methods: problem-based learning (PBL), PBL with lecture method, and conventional teaching on self-directed learning skills among physics undergraduates. The actual sample size comprises of 122 students, who were selected randomly from the Physics Department, College of Education in Iraq. In this study, the pre- and post-test were done and the instruments were administered to the students for data collection. The data was analyzed and statistical results rejected null hypothesis of this study. This study revealed that there are no signifigant differences between PBL and PBL with lecture method, thus the PBL without or with lecture method enhances the self-directed learning skills bette
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show More