The event of crossing the barriers is one of the Power Games activities that have received great attention in the field of researches. Which led to ma..
The primary objective of this study is to examine the effects of a do-it-yourself (DIY) technique on the reading comprehension performance of fifth-grade students in preparatory schools. In order to accomplish the objective of this research, it is posited that a null hypothesis can be established, suggesting that there are no statistically significant disparities between the average scores of the experimental group, which is instructed using a do-it-yourself (DIY) strategy, and the control groups, which are instructed using a prescribed method, in terms of their reading comprehension attainment. Developing a pre- and post-achievement test. Both groups have been equalized in terms of characteristics such as parental educational leve
... Show MoreObjective: To assess the effect of education program on psychological and social changes of secondary school teachers with menopause.
Method: A quasi-experimental design is carried out with the application of a pre- post –test for menopause secondary school teacher's bio-psychosocial changes. Non-probability sample consists of (60 female teachers) (40) teachers from Al- Rusafa first Education Directorate secondary schools, and (20) teachers from Al- Karkh third Education Directorate secondary schools. The sample was exposed to pretest, educational program, and posttest. Data were collected through the utilization of the study instrument (the questionnaire) and application of bio-psychosocial ed
... Show MoreBackground: the aim of this study was to assess the 2-year pulp survival of deep carious lesions in teeth excavated using a self-limiting protocol in a single-blind randomized controlled clinical trial. Methods: At baseline, 101 teeth with deep carious lesions in 86 patients were excavated randomly using self-limiting or control protocols. Standardized clinical examination and periapical radiographs of teeth were performed after 1- and 2-year follow-ups (REC 14/LO/0880). Results: During the 2-year period of the study, 24 teeth failed (16 and 8 at T12 and T24, respectively). Final analysis shows that 39/63 (61.9%) of teeth were deemed successful (16/33 (48.4%) and 23/30 (76.6%) in the control and experimental groups, respectively wit
... Show MoreThe laminar fluid flow of water through the annulus duct was investigated numerically by ANSYS fluent version 15.0 with height (2.5, 5, 7.5) cm and constant length (L=60cm). With constant heat flux applied to the outer duct. The heat flux at the range (500,1000,1500,2000) w/m2 and Reynolds number values were ≤ 2300. The problem was 2-D investigated. Results revealed that Nusselt number decrease and the wall temperature increase with the increase of heat flux. Also, the average Nusselt number increase as Re increases. And as the height of the annulus increase, the values of the temperature and the local and average Nusselt number increase.
The research aims to: Preparing rehabilitative exercises with accompanying tools to rehabilitate those with shoulder dislocation. Knowing the effect of rehabilitative exercises and accompanying aids in improving the muscular strength and motor range of those with dislocations in the shoulder joint. The two researchers used the experimental design with the same experimental group with the pre and post tests, so the researcher chose a sample appropriate to the nature of his research problem, its goals and its hypotheses, as a sample of the injured was chosen to remove the shoulder joint, who completed the treatment, who were not practicing sports, and those who went to the Physiotherapy Center at Al-Was
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show More