ان للمنهج المدرسي أهمية كبيرة جداً في العملية التربوية لأنه أداتها في تحقيق الأهداف التربوية المنشودة والتي تعمل على تقدم المجتمع وتطوره في مختلف الجوانب. بمعنى ان المنهج غير ثابت بل متغير ليواكب التطور والتغير الحاصل في العالم والمجتمع وهذا يعني ان المنهج المدرسي بكل عناصره والتي من ضمنها المحتوى في تطور دائم فما يصلح لفترة زمنية معينة لا يصلح لفترة زمنية قادمة مما يستلزم القيام بعملية تقويمية بشكل مستمر وخلال مدد زمنية مناسبة لتطوره. ومحتوى مادة الكيمياء كونه احد عناصر المنهج الذي يساهم في إكتساب المتعلمين المفاهيم والاتجاهات والمهارات الكيميائية التي تساعد في بناء شخصيتهم. وبما ان محتوى هذا المنهج يقدم إلى المتعلمين في مرحلة مهمة في تخصصهم العلمي الذي يعد الأساس المهم للصفوف المنتهية للمرحلة الأساسية والإعدادية والثانوية والتعليم العالي فضلاً عن محتوى منهج مادة الكيمياء للصف الخامس العلمي لم يقوم منذ فترة طويلة حسب علم الباحثة , لذا فأن هدف البحث هو تقويم محتوى منهج مادة الكيمياء للصف الخامس العلمي الذي هو العنصر الثاني من المرحلة الأولى لبناء المنهج. اما قيما يخص إجراءات البحث فقد اتبعت الخطوات التالية: يتألف مجتمع البحث من المدارس الثانوية والإعدادية والأساسية في مدينة بغداد المركز والتي تدرس مادة الكيمياء . تتألف عينة البحث : من مجتمع البحث من المدرسين والمدرسات لمادة كيمياء الصف الخامس العلمي بافتراض وجود عدد من المدرسين مساوي لعدد المدارس تم اختبار عدد منها بالطريقة العشوائية الطبقية فتم توزيع (150) استمارة بالطريقة العشوائية الطبقية مجتمع الاختصاصيين التربويين لمادة الكيمياء للصف الخامس العلمي وقد شملهم البحث جميعاً.
Cloud computing is the new technological trend for future generations. It represents a new way to use IT resources more efficiently. Cloud computing is one of the most technological models for developing and exploiting infrastructure resources in the world. Under the cloud, the user no longer needs to look for major financing to purchase infrastructure equipment as companies, especially small and medium-sized ones, can get the equipment as a service, rather than buying it as a product. The idea of cloud computing dates back to the sixties of the last century, but this idea did not come into actual application until the beginning of the third millennium, at the hands of technology companies such as Apple, Hp, IBM, which had
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreCarbon nanoparticles are prepared by sonication using carbon black powder. The surface morphology of carbon black (CB) and carbon nanoparticles (CNPs) is investigated using scanning electron microscopy (SEM). The particles size ranges from 100 nm to 400 nm for CB and from 10 nm to 100 nm for CNPs. CNPs and CB are mixed with silicon glue of different ratios of 0.025, 0.2, 0.05, and 0.1 to synthesis films. The optical properties of the prepared films are investigated through reflectance and absorbance analyses. The ratio of 0.05 for CNPs and CB is the best for solar paint because of its higher solar water heater efficiency and is then added to the silicon glue . Temperature of cold water and temperature of hot water in storage tank were ta
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show Moreاطروحة ازمة كشمير واثرها على العلاقات الهندية - الباكستانية
This research deals with the case of the Iraqi joint-stock companies listed on the Iraq Stock Exchange study in terms of compliance with the requirements of IAS 33 "Earnings per share" and the research problem Alrtash concentrated in a statement the commitment of those companies the requirements of the International Standard 33, which may adversely affect the quality of financial reporting where and in particular the quality of accounting information and content of the primary and secondary characteristics make them be of interest to the decisions of its users, so the aim of this research to the statement of financial reporting earnings per share on the quality of financial reporting in listed shareholding in Iraq Stock Exchange
... Show MoreBrainstorming is one of the fundamental and necessary concepts for practicing the auditing profession, as auditing standards encouraged the implementation of brainstorming sessions to reach reasonable assurance about the validity of the evidence and information obtained by the auditor to detect fraud, as the implementation of brainstorming sessions and the practice of professional suspicion during the audit process lead to increase the quality of auditing and thus raise the financial community's confidence in the auditing profession again after it was exposed to several crises that led to the financial community losing confidence in the auditing profession.
The research aims to explain the effect of brain
... Show MoreSkills learning is considered as an important factor in learning any subject as well as mathematics . Mathematical skills have a number of steps that should be learned and understood faster and with more accuracy . The practical or applied skills are type of learning which includes educational preparation and hand on skills is acquired which conducted by organized educational institutions. The sample included (120) students (males and females) first year / dept.of electrical technigues . The mathematical skills are implemented to wire up the electrical circuts. Test is implemented with questions concerned with the skills .statistical operations were conducted as well as the validity and standard deviation for the test .The results showed
... Show MoreThis research aims to find out the extent the reflection of tacit knowledge dimensions (experience, skill, intuition, the ability to think) on Organizational performance of the offices of inspectors general dimensions (internal processes, growth and learning the focus, the focus on the customer) and the measurement and analysis of the type of impact the tacit knowledge of auditors on performance Organizational in inspectors general offices, the research seeks to diagnose the extent of awareness of Office Management knowledge implicit and the attention span of the administration in determining levels and performance levels, and the resolution means the main information-gathering adopted by the researcher, which, as well as his exp
... Show Moreيتطلب تحقيق تمايز الوحدة الاقتصادية في ظل استعمال تقنيات الأعمال الحديثة وازدياد المنافسة وعالمية الأعمال ضرورة الاهتمام بمستوى نوعية المنتجات وما تتطلبه هذه النوعية من كلف والتي تسمى بكلف النوعية، إذ ان العديد من الشركات العالمية قد قامت بدراسة وتحليل هذه الكلف ووضع برامج خاصة بها بهدف تخفيضها إلى أدنى حدٍ ممكن وبما يكفل تحقيق العديد من المنافع والتوفيرات في هذه الكلف وبما يرشد عملية اتخاذ القرارات
... Show More