Preferred Language
Articles
/
5BbbpYcBVTCNdQwCglmF
A Training Program Based on Integrating Future Thinking Skills and Classroom Interaction Patterns for Mathematics Teachers and Providing Their Students with Creative Solution Skills
...Show More Authors

The research aims to recognize the impact of the training program based on integrating future thinking skills and classroom interaction patterns for mathematics teachers and providing their students with creative solution skills. To achieve the goal of the research, the following hypothesis was formulated: There is no statistically significant difference at the level (0.05) between the mean scores of students of mathematics teachers whose teachers trained according to the proposed training program (the experimental group) and whose teachers were not trained according to the proposed training program (the control group) in Pre-post creative solution skills test. Research sample is consisted of (31) teachers and schools were distributed into two groups: experimental (15) and control group (16) and the student sample consisted of (310) male and female students and by (150) for the experimental group (whose teachers were trained according to the training program) and (160) for the control group (whose teachers were not trained in the training program).  The researcher prepared a test for creative solving skills that consisted of (27) items of multiple choice and essay type. Its validity, stability, coefficient of difficulty, discriminatory power, and the effectiveness of the wrong alternatives were calculated. In analyzing the results, the researcher relied on a test and (T-test) for two independent samples and the size of the effect, and the results were as follows: there is a statistically significant difference at the level (0.05) between the average scores of mathematics teachers who trained their teachers according to the proposed training program (the experimental group) and who Their teachers did not train according to the proposed training program (the control group) in the post-creative solution skills test.

Crossref
View Publication
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Tue Jul 19 2022
Journal Name
Res Militaris
Urban Geomorphology and Its Impact on Determining the Trends of Urban Expansion in The City of Kut and Its Future Expectations Using Geographic Information Systems
...Show More Authors

Geomorphology is concerned with the topographic units that make up the Earth's surface. These take many forms, such as mountains and rivers, and include many dangers such as landslides, landslides and erosion. Many studies appeared in this field to analyze its effects and risks resulting from it, including urban studies, to determine the trends of optimal urban expansion and its geomorphological interactions. The results showed that the city of Kut originated and expanded near the course of the Tigris River and its branches, and it suffers from unbalanced urban expansion, due to the high rate of population growth, and overcrowding in housing units with the growth of urban land uses in it, which prompted the city to extend horizontally and v

... Show More
Scopus
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The reality of manufacturing industries and ways to reduce the rent economy in Iraq (Future Vision)
...Show More Authors

Manufacturing industries are at the beginning of the thinking of those who put economic policies in developed countries and also more in developing countries, where manufacturing is the engine of industrial and economic development through its performance and its effective role in the formation of GDP, as well as the great advantages that characterize this sector and affect Largely on sustainable development, as well as its importance in its influential role in protecting national industry through increased exports and reduced imports.

      Iraq is one of the countries that rely on its oil economy to rely entirely on the provision of needs and requirements of the state, and this

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 26 2018
Journal Name
International Research Journal Of Pharmacy
DENTAL PHARMACOLOGICAL KNOWLEDGE AMONG IRAQI MOTHERS AND ITS IMPACT ON THEIR CHILDREN
...Show More Authors

View Publication
Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
The impact of the Roundtable and Self-Questioning strategies on achievement and self-efficacy For students of the Faculty of Education in the subject of research curricula
...Show More Authors

The current research aims to identify "the impact of the round table strategies and the question of self-achievement and self-efficacy among students of the Faculty of Education in research methodology course.” The research sample consisted of (75) male and female-third stage students in the department of Life Sciences / College of Education for Pure Sciences / University of Dhi Qar for the academic year (2018-2019. The researcher adopted the experimental approach to achieving the study objectives. The researcher prepared two tools: the achievement test and the self-efficacy scale were applied to the collected sample to obtain the needed data. The result showed that there was a statistically significant difference at the level (0.05) b

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 27 2024
Journal Name
Malaysian Journal Of Mathematical Sciences
Dynamics of a Social Model for Marriage and Divorce Relationship with Fear Effect
...Show More Authors

The objective of this article is to delve into the intricate dynamics of marriage relationships, exploring the impact of emotions such as fear, love, financial considerations and likability. In our investigation, we adopt a perspective that acknowledges the nonlinear nature of interactions among individuals. Diverging from certain prior studies, we propose that the fear element within the context of marriage is not a singular, isolated factor but rather a manifestation resulting from the amalgamation of numerous social issues. This, in turn, contributes to the emergence of strained and unsuccessful relationships. Unlike conventional approaches, we extensively examine the conditions essential for the existence of all socially signifi

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Mon Dec 21 2020
Journal Name
International Journal Of Environmental Analytical Chemistry
Comparative study of embedded functionalised MWCNTs and GO in Ultrafiltration (UF) PVC membrane: interaction mechanisms and performance
...Show More Authors

View Publication
Scopus (45)
Crossref (42)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (4)
Scopus
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref