After the twenty – first century become necessary for us motorcade era in educational a chevements by searching for the best strategies and teaching methods and techniques artotalbagesh resorting to the strategy
Did not use in use in the teaching of the foreseeable material general by voice and teaching perspective for the student of the class fourth science
In particular ,so the researcher asking the question follows:
Can the peer education strategy to have an impact in perspective drawing skill development ?
From here it demonstrated the importance of current research know the impact of p
... Show MoreIn this paper, double Sumudu and double Elzaki transforms methods are used to compute the numerical solutions for some types of fractional order partial differential equations with constant coefficients and explaining the efficiently of the method by illustrating some numerical examples that are computed by using Mathcad 15.and graphic in Matlab R2015a.
This research aims to find out "the effectiveness of the self-questioning strategy in the achievement of students Phase III institutes of teacher preparation and decision-making in chemistry." The researcher follows approach quasi-experimental with a post-test, and the sample consisted of (27) from " Teachers Training Institute-AL-Byaa "in Directorate of Education Baghdad Karkh / 2 students divided into two unequal groups: experimental its number (14) students studied using reciprocal teaching strategy and control its number (13) students have studied in the usual way.The two groups were equivalent extraneous variables.
The researcher was prepare achievement test consist of 40 items was the adoption of a measure of decision-makin
... Show MoreAbstract:
the current research aims at analyzing the efficiency of the private university teaching that recently expanded after 2003 ,;besides , the commitment of the private colleges ,definitely Al-Maamun and Al-Mansour colleges with strategy of the ministry of higher education and scientific research. This could be done through many indications that measure the efficiency of the private university teaching , including ( the indication of the efficiency of using human resources and efficiency in using the materialistic indications. But the human efficiency in these colleges , including the sample of the research ( Maamun
... Show MoreEDIRKTO, an Implicit Type Runge-Kutta Method of Diagonally Embedded pairs, is a novel approach presented in the paper that may be used to solve 4th-order ordinary differential equations of the form . There are two pairs of EDIRKTO, with three stages each: EDIRKTO4(3) and EDIRKTO5(4). The derivation techniques of the method indicate that the higher-order pair is more accurate, while the lower-order pair provides superior error estimates. Next, using these pairs as a basis, we developed variable step codes and applied them to a series of -order ODE problems. The numerical outcomes demonstrated how much more effective their approach is in reducing the quantity of function evaluations needed to resolve fourth-order ODE issues.
The inverse kinematic equation for a robot is very important to the control robot’s motion and position. The solving of this equation is complex for the rigid robot due to the dependency of this equation on the joint configuration and structure of robot link. In light robot arms, where the flexibility exists, the solving of this problem is more complicated than the rigid link robot because the deformation variables (elongation and bending) are present in the forward kinematic equation. The finding of an inverse kinematic equation needs to obtain the relation between the joint angles and both of the end-effector position and deformations variables. In this work, a neural network has been proposed to solve the problem of inverse kinemati
... Show MoreIn this paper, the methods of weighted residuals: Collocation Method (CM), Least Squares Method (LSM) and Galerkin Method (GM) are used to solve the thin film flow (TFF) equation. The weighted residual methods were implemented to get an approximate solution to the TFF equation. The accuracy of the obtained results is checked by calculating the maximum error remainder functions (MER). Moreover, the outcomes were examined in comparison with the 4th-order Runge-Kutta method (RK4) and good agreements have been achieved. All the evaluations have been successfully implemented by using the computer system Mathematica®10.
Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show More