Preferred Language
Articles
/
DxePnZABVTCNdQwCFY8C
E-Learning Applications According To The Levels Of STEM Literacy For Teachers Of Physics At The Secondary Stage
...Show More Authors

E-learning applications according to the levels of enlightenment (STEM Literacy) for physics teachers in the secondary stage. The sample consists of (400) teachers, at a rate of (200) males (50%), and (200)females (50%), distributed over (6) directorates of education in Baghdad governorate on both sides of Rusafa and Karkh. To verify the research goals, the researcher built a scale of e-learning applications according to the levels of STEM Literacy, which consists of (50) items distributed over (5) levels. The face validity of the scale and its stability were verified by extracting the stability coefficient through the internal consistency method “Alf-Cronbach”. The following statistical means were used: Pearson correlation coefficient, arithmetic mean, and standard deviation, where the result was reached that secondary school physics teachers have e-learning applications according to (STEM Literacy) levels. In light of this, the researcher presented a set of recommendations and suggestions.

Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Material Requirements Planning for the Electric Motor in Fuzzy Environment for State Company for Electric Industries
...Show More Authors

ABSTRUCT

This research aims at examining the expected gap between the fact of planning and controlling process of production at the State Company for Electric Industries and implementation of material requirements planning system in fuzzy environment. Developing solutions to bridge the gap is required to provide specific mechanisms subject to the logic of fuzzy rules that will keep pace with demand for increased accuracy and reduced waiting times depending on demand forecast, investment in inventory to reduce costs to a minimum.

The proposed solutions for overcoming the research problem has required some  questions reflecting the problem with its multiple dimensions, which ar

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 13 2020
Journal Name
College Of Islamic Sciences
 Faith and its belongings at Imam Al-Qurtubi
...Show More Authors

The current research consists of four chapters, the first chapter of which is devoted to presenting the research problem, its importance, purpose and limitations as well as a definition of its terms, as the research was limited to knowing the effect of plant decoration in the Kufic script, while the second chapter included the theoretical framework of the research, which consisted of two topics, one of which is the plant decoration, The second relates to the Kufic script and the stages of its formation, development, and intonation. The third chapter includes the research methodology and mechanisms for analyzing the linear panels. The fourth chapter, during which the most important findings of the researcher were presented, are as follows

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Engineering
Gas Adsorption and Storage at Metal-Organic Frameworks
...Show More Authors

Dry gas is considered one of the most environmentally friendly sources of energy. As a result, developing an efficient strategy for storing this gas has become essential. In this work, MOF-199 was synthesized and characterized in order to investigate the MOF-199 in dry gas adsorption using a built-in volumetric system (methane, ethane, and propane from Basrah gas company). The MOF-199 (metal organic framework) was synthesized using the solvothermal method at 373K for 24h, and then it was characterized. The dry gas adsorption on MOF-199 was studied under various conditions (adsorbent dosage, contact time, temperature, and pressure). The isothermal adsorption of the dry gas had been studied on MOF-199 using two types of mo

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Probabilistic Model building using the Transformation Entropy for the Burr type –xii Distribution
...Show More Authors

Entropy define as uncertainty measure has been transfared by using the cumulative distribution function and reliability function for the Burr type – xii. In the case of data which suffer from volatility to build a model the probability distribution on every failure of a sample after achieving limitations function, probabilistic distribution. Has been derived formula probability distribution of the new transfer application entropy on the probability distribution of continuous Burr Type-XII and tested a new function and found that it achieved the conditions function probability, been derived mean and function probabilistic aggregate in order to be approved in the generation of data for the purpose of implementation of simulation

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 04 2021
Journal Name
Turkish Journal Of Computer And Mathematics Education (turcomat)
Systems thinking skills included in the mathematics textbook for the third intermediate grade
...Show More Authors

Abstract:  The aim of the current research is to find out the extent to which systems thinking skills are included in the mathematics textbook scheduled for the third intermediate grade for the academic year (2020-2021) by answering the main research question: What are the systems thinking skills included in the mathematics textbook for middle third grade?   The analytical descriptive approach was used, and to achieve the goal of the research, a list of the main systemic thinking skills and sub-skills was prepared, and after analyzing the content of the mathematics textbook, the reliability of the analysis was verified through the analysis over time and through others, and it obtained a reliability rate of 98% us

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 31 2017
Journal Name
College Of Islamic Sciences
Mask technique in the poem "Christ after the crucifixion" for Bder Shaker Al_Sayab
...Show More Authors

Research summary

Perhaps the methods of mask that Arab poets resorted to in our time are due to the conditions of oppression and political and social repression that the Arab poet suffered from; So he strived to circumvent it, and it became a justification for hiding behind it. The research is available on a number of topics that lead to the definition of the mask technique and the beginning of its prevalence in Arabic literature after the Second World War, especially in recent decades by benefiting from historical stories, fairy tales and legends of all kinds. As well as defining the mask idiomatically and linguistically, and the beginning of its use in ancient religious rituals, and the special place it had in Greek plays. Poets

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 29 2024
Journal Name
Journal Of Humanities And Social Sciences Researches
Measuring and Analysis the Relationship between the Internal Public Debt and the Exchange Rate in the Iraqi Economy for The Period 2004 – 2022
...Show More Authors

The scholastic view of public religion differed, and this difference was on two extremes. All economic schools agreed that public debt is a monetary liquidity that was unjustly deducted from the income and output cycle as a result of the imbalance in the economic balance and the departure from the conditions of balance between aggregate demand and aggregate supply. Debt is a waste of financial resources allocated to productive accumulation. Except for the Keynesian school, which considers public debt to be an addition to aggregate demand after the decline in the role of the private sector in investment as a result of pessimistic expectations that warn of signs of economic contraction. Public debt is linked to the ex

... Show More
Preview PDF
Publication Date
Thu Dec 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The relationship between oil revenues and financial sustainability in the Iraq analysis for the period (1990-2013)
...Show More Authors

This study aimed to analyze and measure the relationship between oil revenues and financial sustainability in Iraq, the study used the stylistic approach inductive and deductive approach. Accompanied by the use of quantitative and analytical style, which was based on two variables oil revenues and net general budget on annual data covered the period (1990-2013). Among the most important findings of the study contain the time-series variables study on the root of the unit and is not stable in the general level, and become stable after the use of mathematical processors to gain access to a stable by taking the first difference of natural Ogartm of the series. The way (Johnson) to a long-term relationship between oil revenues and ne

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 03 2010
Journal Name
Journal Of Educational And Psychological Researches
The non right behavior appearance for the kindergarten children and its relation with the kindergarten teaching style
...Show More Authors

The kindergarten teacher play a role in fixing the children behavior so she must plant the value and the habits that make a positive behavior and accepted by the society so the teacher must know all the right educational psychological styles to fix the children behavior and make them accepted psychologically and socially so the problem of the research start from knowing the relation between the methods of dealing with the kindergarten’s teachers and the non right behavior appearance for the kindergarten children. The current research aims to measure the negative behavior appearance of the children of kindergarten and distinguish it according to (sex and levels) and to distinguish the most using styles by the teachers of kinderg

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (19)
Crossref (11)
Scopus Crossref