ان للمنهج المدرسي أهمية كبيرة جداً في العملية التربوية لأنه أداتها في تحقيق الأهداف التربوية المنشودة والتي تعمل على تقدم المجتمع وتطوره في مختلف الجوانب. بمعنى ان المنهج غير ثابت بل متغير ليواكب التطور والتغير الحاصل في العالم والمجتمع وهذا يعني ان المنهج المدرسي بكل عناصره والتي من ضمنها المحتوى في تطور دائم فما يصلح لفترة زمنية معينة لا يصلح لفترة زمنية قادمة مما يستلزم القيام بعملية تقويمية بشكل مستمر وخلال مدد زمنية مناسبة لتطوره. ومحتوى مادة الكيمياء كونه احد عناصر المنهج الذي يساهم في إكتساب المتعلمين المفاهيم والاتجاهات والمهارات الكيميائية التي تساعد في بناء شخصيتهم. وبما ان محتوى هذا المنهج يقدم إلى المتعلمين في مرحلة مهمة في تخصصهم العلمي الذي يعد الأساس المهم للصفوف المنتهية للمرحلة الأساسية والإعدادية والثانوية والتعليم العالي فضلاً عن محتوى منهج مادة الكيمياء للصف الخامس العلمي لم يقوم منذ فترة طويلة حسب علم الباحثة , لذا فأن هدف البحث هو تقويم محتوى منهج مادة الكيمياء للصف الخامس العلمي الذي هو العنصر الثاني من المرحلة الأولى لبناء المنهج. اما قيما يخص إجراءات البحث فقد اتبعت الخطوات التالية: يتألف مجتمع البحث من المدارس الثانوية والإعدادية والأساسية في مدينة بغداد المركز والتي تدرس مادة الكيمياء . تتألف عينة البحث : من مجتمع البحث من المدرسين والمدرسات لمادة كيمياء الصف الخامس العلمي بافتراض وجود عدد من المدرسين مساوي لعدد المدارس تم اختبار عدد منها بالطريقة العشوائية الطبقية فتم توزيع (150) استمارة بالطريقة العشوائية الطبقية مجتمع الاختصاصيين التربويين لمادة الكيمياء للصف الخامس العلمي وقد شملهم البحث جميعاً.
In this paper, a microcontroller-based electronic circuit have been designed and implemented for dental curing system using 8-bit MCS-51 microcontroller. Also a new control card is designed while considering advantages of microcontroller systems the time of curing was controlled automatically by preset values which were input from a push-button switch. An ignition based on PWM technique was used to reduce the high starting current needed for the halogen lamp. This paper and through the test result will show a good performance of the proposed system.
Under major developments in the field of business environment, the use of traditional budgets do not fit into these developments and adversely affect the future performance of the enterprises, which requires the transition to modern systems in the preparation of the budgets of activity based budgeting ABB because they provide a more accurate and objective estimates based on scientific foundations and practical avoided arising from the use of traditional budgeting problems, Where ABB is working better allocation of resources based on the activities of an enterprise and this positively affects the performance of the administration for the purpose of evaluating their performance according to responsibility centers and decision-making govern
... Show MoreAn adaptive nonlinear neural controller to reduce the nonlinear flutter in 2-D wing is proposed in the paper. The nonlinearities in the system come from the quasi steady aerodynamic model and torsional spring in pitch direction. Time domain simulations are used to examine the dynamic aero elastic instabilities of the system (e.g. the onset of flutter and limit cycle oscillation, LCO). The structure of the controller consists of two models :the modified Elman neural network (MENN) and the feed forward multi-layer Perceptron (MLP). The MENN model is trained with off-line and on-line stages to guarantee that the outputs of the model accurately represent the plunge and pitch motion of the wing and this neural model acts as the identifier. Th
... Show MoreThe treasury bills one internal government debt instruments in iraq that were used to finance temporary deficits in the government budget, There fore the government resorted to issuing for the purpose of providing liquidity, As well as to invest in productive progects, After that it was financing the budget deficit by the monetary authovity of the central baalpennek [the new cash velease] which led to negative effects on the Iraqi econome, Thus we find that the treasury transfers have formed alarge proportion of the gross domestic government debt to finance the deficit ayear ago 2003. &nbs
... Show MoreA hand gesture recognition system provides a robust and innovative solution to nonverbal communication through human–computer interaction. Deep learning models have excellent potential for usage in recognition applications. To overcome related issues, most previous studies have proposed new model architectures or have fine-tuned pre-trained models. Furthermore, these studies relied on one standard dataset for both training and testing. Thus, the accuracy of these studies is reasonable. Unlike these works, the current study investigates two deep learning models with intermediate layers to recognize static hand gesture images. Both models were tested on different datasets, adjusted to suit the dataset, and then trained under different m
... Show MoreThe adsorption of Malonic acid, Succinic acid, Adipic acid, and Azelaic acid from their aqueous solutions on zinc oxide surface were investigated. The adsorption efficiency was investigated using various factors such as adsorbent amount, contact time, initial concentration, and temperature. Optimum conditions for acids removal from its aqueous solutions were found to be adsorbent dose (0.2 g), equilibrium contact time (40 minutes), initial acids concentration (0.005 M). Variation of temperature as a function of adsorption efficiency showed that increasing the temperature would result in decreasing the adsorption ability. Kinetic modeling by applying the pseudo-second order model can provide a better fit of the data with a greater correla
... Show MoreDisease diagnosis with computer-aided methods has been extensively studied and applied in diagnosing and monitoring of several chronic diseases. Early detection and risk assessment of breast diseases based on clinical data is helpful for doctors to make early diagnosis and monitor the disease progression. The purpose of this study is to exploit the Convolutional Neural Network (CNN) in discriminating breast MRI scans into pathological and healthy. In this study, a fully automated and efficient deep features extraction algorithm that exploits the spatial information obtained from both T2W-TSE and STIR MRI sequences to discriminate between pathological and healthy breast MRI scans. The breast MRI scans are preprocessed prior to the feature
... Show MoreIn this paper, we have extracted Silica from rice husk ash (RHA) by sodium hydroxide to produce sodium silicate. 3-(chloropropyl)triethoxysilane (CPTES) functionalized with sodium silicate via a sol-gel method in one pot synthesis to prepare RHACCl. Chloro group in compound RHACCl replacement in iodo group to prepere RHACI. The FT-IR clearly showed absorption band of C-I at 580 cm-1. Functionalized silica RHACI has high surface area (410 m2/g) and average pore diameter (3.8 nm) within mesoporous range. X-ray diffraction pattern showed that functionalized silica RHACI has amorphous phase .Thermogravemitric analysis (TGA) showed two decomposition stages and SEM morphology of RHACI showed that the particles have irregu
... Show MoreThe nonlinear optical properties for polymeric (PMMA) doping with dye Rhodmine (R3Go) has been studied .The samples are prepared by normal polymerization method with concentrations of 5x10-5mol/l and a thickness of 272.5µm.
Plasma effect was studied on samples prepared before and after exposure to the Nd: YAG laser for three times 5, 10 and 15 minutes. Z-Scan technique is used to determine the nonlinear optical properties such as; refractive index (n2) and the coefficient of nonlinear absorption (β). It was found that the nonlinear properties is change by increasi
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show More