Preferred Language
Articles
/
KUIe45kBMeyNPGM3yrrF
The cognitive and educational importance of the academic teacher for developing the applied skills of third-stage female students in the subject of teaching methods from their point of view
...Show More Authors

The research aimed to prepare a measure of the importance of enlightenment, academic education, and applied skills for third-stage female students, including teaching methods from their point of view/College of Education and Sports Sciences/University of Baghdad/Al-Jadriyah. The researchers used descriptive description in the comprehensive research procedures, an appropriate methodology in achieving the research objectives, sufficient for interpretations, how important is the academic teacher’s knowledge of teaching methods for student learning, what are the roles that the learners have acquired from the academic teacher. The scale of importance and horror consists of 15 items. The research population includes female students of the third stage/College of Education, Fitness and Sports Sciences, numbering (135) students. Attractive artistic drawings were chosen in proportion to 48%. The researchers concluded that the educational and cognitive importance of the academic teacher for developing applied skills for female students is considered the main focus for learners, especially for third-year female students, as she is the link through which what has been learned at this stage is linked and refined in the next stage of the educational process for female students. The researchers recommend benefiting from the academic teacher for the subject. Teaching methods in holding workshops and lectures for all educational levels, and emphasizing the importance of the subject of teaching methods for learners because it is the jewel that is acquired during the four years of study.

Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Arab World English Journal
Impoliteness Formulas, Triggers, and Purposes to Refusal as Employed by Iraqi English Learners
...Show More Authors

The present study aims at scrutinizing the impoliteness types, causes, and purposes utilized by Iraqi English language learners when refusing marriage proposals. Thus, it attempts to answer the questions: (1) what are the impoliteness formulas used by the Iraqi learners of English in refusing marriage proposals?, and (2) What are their impoliteness triggers/causes and the purposes? The study is significant in bridging the gap that few linguistic types of research concentrate on studying intentionality and emotions allied with impoliteness. Data were collected from 35 Iraqi learners of English responding to 6 situations of marriage. The data were analyzed using Culpeper’s (2011) formulas of impoliteness and Bousfield’s (2007) imp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
End-to-End Speaker Profiling Using 1D CNN Architectures and Filter Bank Initialization
...Show More Authors

The automatic estimation of speaker characteristics, such as height, age, and gender, has various applications in forensics, surveillance, customer service, and many human-robot interaction applications. These applications are often required to produce a response promptly. This work proposes a novel approach to speaker profiling by combining filter bank initializations, such as continuous wavelets and gammatone filter banks, with one-dimensional (1D) convolutional neural networks (CNN) and residual blocks. The proposed end-to-end model goes from the raw waveform to an estimated height, age, and gender of the speaker by learning speaker representation directly from the audio signal without relying on handcrafted and pre-computed acou

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Dec 25 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Knowledge, Attitudes and Barriers Towards Breast Cancer Health Education Among Iraqi Community Pharmacists
...Show More Authors

With the increasing prevalence of breast cancer among female internationally, occupies about 25% of all cases of cancer, with a measured 1.57 million up to date cases in 2012. Breast cancer has turn a most warning to health of female in Iraq, where it is the major cause of death among women after cardiovascular diseases, with a mortality rate of 23% related cancer. Recently there is a crucial requirement to include community pharmacists in health elevation activities to support awareness and early diagnosis of cancer, specially breast cancer. The aim of this study is to assess knowledge, attitude and perceived barriers amongst Iraqi community pharmacists towards health promotion of breast cancer. This study is cross sectional research. A

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Compared Some Estimators Ordinary Ridge Regression And Bayesian Ridge Regression With Practical Application
...Show More Authors

Maulticollinearity is a problem that always occurs when two or more predictor variables are correlated with each other. consist of the breach of one basic assumptions of the ordinary least squares method with biased estimates results, There are several methods which are proposed to handle this problem including the  method To address a problem  and  method To address a problem , In this research a comparisons are employed between the biased   method and unbiased   method with Bayesian   using Gamma distribution  method  addition to Ordinary Least Square metho

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
To Domesticate or to Foreignize: An Approach to Translating Fables and Fairy Tales
...Show More Authors

      The present study deals with the strategies used in the Arabic translations of the most popular genres of children’s literature; namely fairy tales and fables as an attempt to identify the best methods and strategies to be adopted in translating these genres to fulfill the ultimate purpose of enriching the children’s knowledge in addition to attracting their interest and arousing the joy sought for in every piece of literature.

The study sets off from three dominating trends: the first calls for the adoption of domestication strategy of translation as the most appropriate and effective strategy in translation for children. In the same line, the second opposes using the foreignization strategy, w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (36)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Tue Jun 23 2015
Journal Name
Nature Communications
A metabolic stress-inducible miR-34a-HNF4α pathway regulates lipid and lipoprotein metabolism
...Show More Authors

View Publication
Scopus (230)
Crossref (230)
Scopus Clarivate Crossref