Preferred Language
Articles
/
pxe2ao4BVTCNdQwC7kd_
The cognitive and educational importance of the academic teacher for developing the applied skills of third-stage female students in the subject of teaching methods from their point of view
...Show More Authors

The research aimed to prepare a measure of the importance of enlightenment, academic education, and applied skills for third-stage female students, including teaching methods from their point of view/College of Education and Sports Sciences/University of Baghdad/Al-Jadriyah. The researchers used descriptive description in the comprehensive research procedures, an appropriate methodology in achieving the research objectives, sufficient for interpretations, how important is the academic teacher’s knowledge of teaching methods for student learning, what are the roles that the learners have acquired from the academic teacher. The scale of importance and horror consists of 15 items. The research population includes female students of the third stage/College of Education, Fitness and Sports Sciences, numbering (135) students. Attractive artistic drawings were chosen in proportion to 48%. The researchers concluded that the educational and cognitive importance of the academic teacher for developing applied skills for female students is considered the main focus for learners, especially for third-year female students, as she is the link through which what has been learned at this stage is linked and refined in the next stage of the educational process for female students. The researchers recommend benefiting from the academic teacher for the subject. Teaching methods in holding workshops and lectures for all educational levels, and emphasizing the importance of the subject of teaching methods for learners because it is the jewel that is acquired during the four years of study.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Ammonia Removal in Free-Surface Constructed Wetlands Employing Synthetic Floating Islands: Employing synthetic floating islands
...Show More Authors

Free water surface constructed wetlands (FSCWs) can be used to complement conventional waste water treatment but removal efficiencies are often limited by a high ratio of water volume to biofilm surface area (i.e. high water depth). Floating treatment wetlands (FTWs) consist of floating matrices which can enhance the surface area available for the development of fixed microbial biofilms and provide a platform for plant growth (which can remove pollutants by uptake).  In this study the potential of FTWs for ammoniacal nitrogen (AN) removal was evaluated using experimental mesocosms operated under steady-state flow conditions with ten different treatments (two water depths, two levels of FTW mat coverage, two different plant densities and

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Transport Assessment Using Bayesian Method to Determine Ride-Hailing in Kula Lumpur: A Case Study
...Show More Authors

This research was designed to investigate the factors affecting the frequency of use of ride-hailing in a fast-growing metropolitan region in Southeast Asia, Kuala Lumpur. An intercept survey was used to conduct this study in three potential locations that were acknowledged by one of the most famous ride-hailing companies in Kuala Lumpur. This study used non-parametric and machine learning techniques to analyze the data, including the Pearson chi-square test and Bayesian Network. From 38 statements (input variables), the Pearson chi-square test identified 14 variables as the most important. These variables were used as predictors in developing a BN model that predicts the probability of weekly usage frequency of ride-hai

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Sensors
WDARS: A Weighted Data Aggregation Routing Strategy with Minimum Link Cost in Event-Driven WSNs
...Show More Authors

Realizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost

... Show More
View Publication Preview PDF
Scopus (38)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Sat Mar 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Using Elastic Properties as a Predictive Tool to Identify Pore-Fluid Type in Carbonate Formations
...Show More Authors

The aim of this study is for testing the applicability of Ramamoorthy and Murphy method for identification of predominant pore fluid type, in Middle Eastern carbonate reservoir, by analyzing the dynamic elastic properties derived from the sonic log. and involving the results of Souder, for testing the same method in chalk reservoir in the North Sea region. Mishrif formation in Garraf oilfield in southern Iraq was handled in this study, utilizing a slightly-deviated well data, these data include open-hole full-set logs, where, the sonic log composed of shear and compression modes, and geologic description to check the results. The Geolog software is used to make the conventional interpretation of porosity, lithology, and saturation. Also,

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Jun 14 2016
Journal Name
Transactions Of The Asabe
Using Terahertz Time-Domain Spectroscopy to Discriminate among Water Contamination Levels in Diesel Engine Oil
...Show More Authors

View Publication
Scopus (35)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Mon Oct 31 2022
Journal Name
International Journal Of Intelligent Engineering And Systems
Robot Path Planning in Unknown Environments with Multi-Objectives Using an Improved COOT Optimization Algorithm
...Show More Authors

Scopus (13)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jan 26 2020
Journal Name
Journal Of Global Pharma Technology
Synthesis, Characterization of 2-azido-4-(azido (2-azido-2-( azido carbonyl)-1,3-dioxoian-4-yl)methyl)– 5-((R-azido (hydroxyl) methyl- 1,3-dioxole-2-carbonyl azide. ethanol. hydrate (L-AZD) with Some Metal Complexes
...Show More Authors

The reaction oisolated and characterized by elemental analysis (C,H,N) , 1H-NMR, mass spectra and Fourier transform (Ft-IR). The reaction of the (L-AZD) with: [VO(II), Cr(III), Mn(II), Co(II), Ni(II), Cu(II), Zn(II), Cd(II) and Hg(II)], has been investigated and was isolated as tri nuclear cluster and characterized by: Ft-IR, U. v- Visible, electrical conductivity, magnetic susceptibilities at 25 Co, atomic absorption and molar ratio. Spectroscopic evidence showed that the binding of metal ions were through azide and carbonyl moieties resulting in a six- coordinating metal ions in [Cr (III), Mn (II), Co (II) and Ni (II)]. The Vo (II), Cu (II), Zn (II), Cd (II) and Hg (II) were coordinated through azide group only forming square pyramidal

... Show More
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Sun Jan 24 2016
Journal Name
Al-academy
Babylonian theater (Its history, models and properties) a historical comparative study: محمد صبري صالح
...Show More Authors

The building of the Babylonian theater is considered as one of the distinctive buildings where its foundations have remained steadfast in the face of geographical changes, social's erosion and groundwater that threatened almost all traces of Babylon despite the destruction of the outer structure of the building. The general directorate of antiques performed prospection for those foundations (the ground map), and then the building was completed by new bricks over the original scheme. It became clear when examining the building; its components and foundations, that the building is unique in comparison with the old buildings of the world throughout Iraq. There are similar buildings in other places like Jordan and North Africa such as

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 08 2025
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Secure E-Voting System Utilizing Fingerprint Authentication, AES-GCM Encryption and Hybrid Blind Watermarking
...Show More Authors

Ensuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a

... Show More
View Publication Preview PDF
Scopus Crossref