Preferred Language
Articles
/
Fhbav4sBVTCNdQwCstvp
Instructional Design According to the Repulsive Learning Model and its Impact on the Achievement of Chemistry and Lateral Thinking for Third-Grade Intermediate Students
...Show More Authors

Identify the effect of an educational design according to the repulsive (allosteric) learning model on the achievement of chemistry and lateral thinking. The sample consisted of (59) students from third-grade intermediate students. They were randomly distributed into two groups (experimental and control), and the equivalence was done in (chronological age, previous achievement in chemistry, intelligence, lateral thinking). The (30) students from experimental group were taught according to the instructional design, other 29 students from the (control) group were taught according to the usual method. Two tests done, one of them is an achievement test consisted of (30) items of the type of multiple choice, the other was a lateral thinking test consisted of (26) items, of (multiple choice). Both of the validity and reliability to the two tools were verified. The results revealed the superiority of the experimental group who studied by the instructional design according to the repulsive learning model in achievement and lateral thinking.

Scopus Crossref
View Publication
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Nov 01 2023
Journal Name
International Society For The Study Of Vernacular Settlements
Responding to Environmental Changes through Resilient Urban Design: Insights from Iraq
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Political Sciences Journal
Russian-American competition in the Middle East:Power and roles conflict: Syria as a model
...Show More Authors

Because of its importance in the world, Middle East area is one of the competition areas between the major and great powers. Among those powers are Russia and United states of America. The competition between these two powers to control Syria is greatly clear since 2011. It is also one of the most important subject in the international politics. This importance comes from the importance of Russia and the United States of America besides importance of the Middle East. At the end of the cold war, United States of America maintained its role in the international system and became the only pole that dominated the international affairs while Russia tried to overcome the challenges inherited from the former Soviet Union, and it succeeded in th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Al–bahith Al–a'alami
From Structure to the Signal (Text and Discourse in the Semiotic Analysis)
...Show More Authors

Care and attention to the structure in the sixties of the last century replaced the mark, and if the structure of Ms. pampered in research and studies, it has become the mark is also a spoiled lady .. But the relationship between the structure and the mark was not a break and break, but the relationship of integration, His themes are structural analysis, and these are intellectual themes that can not be surpassed in contemporary research, especially since semiotics have emerged from the linguistic inflection.

We have tried to distinguish between text and speech, which is a daunting task, as it seems that whenever the difference between them is clear and clear, we come back to wonder whether the text is the same discourse, and is

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 28 2017
Journal Name
Journal Of Engineering
Design and Implementation of Enhanced Smart Energy Metering System
...Show More Authors

In this work, the design and implementation of a smart energy metering system has been developed. This system consists of two parts: billing center and a set of distributed smart energy meters. The function of smart energy meter is measuring and calculating the cost of consumed energy according to a multi-tariff scheme. This can be effectively solving the problem of stressing the electrical grid and rising consumer awareness. Moreover, smart energy meter decreases technical losses by improving power factor. The function of the billing center is to issue a consumer bill and contributes in locating the irregularities on the electrical grid (non-technical losses). Moreover, it sends the switch off command in case of the consumer bill is not

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 01 2011
Journal Name
International Journal Of Mechanical And Materials Engineering
Simulation and design optimization of magneto rheological control valve
...Show More Authors

Magneto-rheological (MR) Valve is one of the devices generally used to control the speed of Hydraulic actuator using MR fluid. The performance of valve depends on the magnetic circuit design. Present study deals with a new design of MR valve. The finite element analysis is carried out on this valve to optimize its design. The design of the magnetic circuit is accomplished by magnetic finite element software such as Finite Element Method Magnetic (FEMM). The Model dimensions of MR valve, material properties and the circuit properties of valve coil are taken into account. The results of analysis are presented in terms of magnetic strength and magnetic flux density. The valve can be operated with variable flow rate by varying the current. It i

... Show More
View Publication Preview PDF
Scopus (2)
Scopus
Publication Date
Mon Jul 10 2023
Journal Name
Journal Of Engineering
Design and Implementation of Single-Phase Boost PFC Converter
...Show More Authors

In this paper, a single-phase boost type ac-dc converter with power factor correction (PFC) technique is designed and implemented. A current mode control at a constant switching frequency is used as a control strategy for PFC converter. The PFC converter is a single-stage singleswitch boost converter that uses a current shaping technique to reshape the non-sinusoidal input current drawn by the bulky capacitor in the conventional rectifier. This technique should provide an input current with almost free-harmonics, comply with the IEC61000-3-2 limits, and a system operates with near unity power factor. The other function of the boost converter that should be
accomplished is to provide a regulated DC output voltage. The complete designed

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
The face of the pressures of life styles to Riyadh parameters and the relationship with some variables
...Show More Authors

I noticed a researcher while working in the kindergarten that there is a group of
parameters resort to the use of different methods may be some undesirable and some
undesirable So felt researcher detection methods used parameters Riyadh in the face of the
pressures of life, being engaged in kindergarten eligibility, governmental or being married or
unmarried, as well as educational attainment for this parameter.
To achieve the objectives of the research: -
The researcher prepare a scale methods face the pressures of life of the parameters
have been confirmed the veracity of the paragraphs of the scale of the presentation to a group
of experts in this area, and extracted power discriminatory clauses scale and extra

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Iraqi Journal Of Agricultural Sciences, 2018, 49(2), Pp. 179–187
Estimation of some genetic parameters for grain yield and its components of maize under watered and water stress
...Show More Authors

Scopus (8)
Scopus