Preferred Language
Articles
/
IhYTGocBVTCNdQwCMjdB
Predicting dynamic shear wave slowness from well logs using machine learning methods in the Mishrif Reservoir, Iraq
...Show More Authors

Crossref
Publication Date
Wed Mar 02 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effect of the Constructivist Learning Model on the Achievement and Reflective Thinking of the Fifth Grade Literary Preparatory Students in History Subject
...Show More Authors

The aim of the study is to reveal the effect of the constructivist learning Model on the achievement and reflective thinking of the fifth grade literary Preparatory students in History subject. A random sample was chosen which consisted of 64 students divided into experimental and control groups, each group consisted of 32 students. The experimental group was taught via the constructivist learning model, and the control group was taught via the traditional method. The experiment was lasted for Eight weeks, each week taught two lessons. The researcher adopted the experimental design with partial control. The two groups were equalized statistically. The researcher used two instruments, the achievement test and the reflective thinking test.

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 02 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effect of the Constructivist Learning Model on the Achievement and Reflective Thinking of the Fifth Grade Literary Preparatory Students in History Subject
...Show More Authors

The aim of the study is to reveal the effect of the constructivist learning Model on the achievement and reflective thinking of the fifth grade literary Preparatory students in History subject. A random sample was chosen which consisted of 64 students divided into experimental and control groups, each group consisted of 32 students. The experimental group was taught via the constructivist learning model, and the control group was taught via the traditional method. The experiment was lasted for Eight weeks, each week taught two lessons. The researcher adopted the experimental design with partial control. The two groups were equalized statistically. The researcher used two instruments, the achievement test and the reflective thinking test.

... Show More
View Publication Preview PDF
Publication Date
Thu May 04 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Study of Genetic Polymorphism in the Mitochondrial DNA of the Mediterranean Fruit Fly Ceratitis Capitata (Wiedemann, 1824) (Diptera:Tephritidae)Using the Method of PCR-RFLP in Three Governorates in the Middle Region of Iraq.
...Show More Authors

Genetic polymorphism in a fragment of NADH (ND4),400bp long from the Mitochondrial DNA
(mtDNA) of Mediterranean fruit fly ceratitis capitata (Wiedemann, 1824) using PCR-RFLP method
with the restriction enzyme EcoRV in samples collected from three governorates in the middle of Iraq.
The purposes of this study is to establish database, discover the introduction source as well as studying
the genetic diversity for this economic pest in Iraq. The results show that there is a genetic
polymorphism of the studied gene fragment among Kut governorate as compaired with the other
studied samples according to digestion results of the restriction enzyme EcoRV.

View Publication Preview PDF
Publication Date
Tue Jun 30 2015
Journal Name
College Of Islamic Sciences
Markets in the Islamic Mashreq   (Iraq / Persia / the country beyond the river) From the era of the Prophet Muhammad (may Allah bless him and his family) To the end of the Buddhist era
...Show More Authors

The follower to study the markets in the Islamic Mashreq (Iraq, Persia and the country of Ma
Behind the river for the period from the reign of the Prophet Muhammad until the end of the Islamic era) to find that there
A remarkable development in the pattern, shape, planning and privatization of markets
Islamic cities and places are the main conditions for their existence, which is the mosque of the mosque
And markets, and these markets have evolved from being a space in which there are no building and no ceilings to shade them in
The places of sale and purchase to specialized markets classified according to the materials and goods produced in them
This would facilitate the task of supervising it by the market factor and

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Hurst exponent estimation methods
...Show More Authors

Through recent years many researchers have developed methods to estimate the self-similarity and long memory parameter that is best known as the Hurst parameter. In this paper, we set a comparison between nine different methods. Most of them use the deviations slope to find an estimate for the Hurst parameter like Rescaled range (R/S), Aggregate Variance (AV), and Absolute moments (AM), and some depend on filtration technique like Discrete Variations (DV), Variance versus level using wavelets (VVL) and Second-order discrete derivative using wavelets (SODDW) were the comparison set by a simulation study to find the most efficient method through MASE. The results of simulation experiments were shown that the performance of the meth

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Bayesian methods to estimate sub - population
...Show More Authors

The aim of the research is to estimate the hidden population. Here، the number of drug users in Baghdad was calculated for the male age group (15-60) years old ، based on the Bayesian models. These models are used to treat some of the bias in the Killworth method Accredited in many countries of the world.

Four models were used: random degree، Barrier effects، Transmission bias، the first model being random، an extension of the Killworth model، adding random effects such as variance and uncertainty Through the size of the personal network، and when expanded by adding the fact that the respondents have different tendencies، the mixture of non-random variables with random to produce

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Al–bahith Al–a'alami
Methods of Arab TV Programs Production
...Show More Authors

This research investigates the methods of producing Investigative Arabic Television Programs that are able to prove its existence during a short period of time as a form of Television programs on Arab satellite channels growing in number and varied in content. The research aims to present qualitative and quantitative descriptions of the methods used in tackling the topics discussed in the program, and knowing whether they satisfy the conditions and scientific foundations for the research, investigation, analysis, and interpretation. The researcher uses the survey method and uses the tool of content analysis including a set of methodological steps that seek to discover the implied meaning of the research sample represented by the program

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Hurst exponent estimation methods
...Show More Authors

Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
Simplification of new fashion design methods
...Show More Authors

Simplification of new fashion design methods

View Publication Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Methods To Prevent SQL Injection
...Show More Authors

  In the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack.     SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input  such as form  and then include this input in database requests, typically SQL statements in a way that was not intende

... Show More
View Publication Preview PDF