Recent research looking for acknowledgment of strategically influence of Robinson and self question at progressing the reading comprehension for students of sixth class .
To achieve research goal so the researcher mentally chose primary sixth class at the school (Tashti the primary) that followed education directorate of province (Jamjamal)/Suliymania for the scholastic year 2012-2013 as application field for their experiment of boys' number reached to (95) (female and male)students in reality (32) of the first experimental group and (31) student (female and male) from controlled group, the researcher rewarded between of three variable groups (timing period, intelligence ,Kurdish language degr
... Show MoreThis study reports the fabrication of tin oxide (SnO2) thin films using pulsed laser deposition (PLD). The effect of 60Co (300, 900, and 1200 Gy) gamma radiation on the structural, morphological, and optical features is systematically demonstrated using X-ray diffraction (XRD), field emission scanning electron microscopy (FE-SEM), atomic force microscopy (AFM), and ultraviolet-visible light analysis (UV-Vis), respectively In XRD tests, the size of the crystallites decreased from 45.5 to 40.8 nm for the control samples and from 1200 Gy to 60Co for the irradiated samples. Using FESEM analysis, the particle diameter revealed a similar trend to that attained using XRD; in particular, the average diameters were 93.8 and
... Show MoreAdministrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has bee
The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show MoreThe world is currently challenging the serious effects of the pandemic of the Coronavirus disease (COVID-19) caused by severe acute respiratory syndrome Coronavirus 2 (SARS-CoV-2). Data on pediatric COVID are rare and scattered in the literature. In this article, we presented the updated knowledge on the pediatric COVID-19 from different aspects. We hope it will increase the awareness of the pediatricians and health care professionals on this pandemic.
Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show More