ان للمنهج المدرسي أهمية كبيرة جداً في العملية التربوية لأنه أداتها في تحقيق الأهداف التربوية المنشودة والتي تعمل على تقدم المجتمع وتطوره في مختلف الجوانب. بمعنى ان المنهج غير ثابت بل متغير ليواكب التطور والتغير الحاصل في العالم والمجتمع وهذا يعني ان المنهج المدرسي بكل عناصره والتي من ضمنها المحتوى في تطور دائم فما يصلح لفترة زمنية معينة لا يصلح لفترة زمنية قادمة مما يستلزم القيام بعملية تقويمية بشكل مستمر وخلال مدد زمنية مناسبة لتطوره. ومحتوى مادة الكيمياء كونه احد عناصر المنهج الذي يساهم في إكتساب المتعلمين المفاهيم والاتجاهات والمهارات الكيميائية التي تساعد في بناء شخصيتهم. وبما ان محتوى هذا المنهج يقدم إلى المتعلمين في مرحلة مهمة في تخصصهم العلمي الذي يعد الأساس المهم للصفوف المنتهية للمرحلة الأساسية والإعدادية والثانوية والتعليم العالي فضلاً عن محتوى منهج مادة الكيمياء للصف الخامس العلمي لم يقوم منذ فترة طويلة حسب علم الباحثة , لذا فأن هدف البحث هو تقويم محتوى منهج مادة الكيمياء للصف الخامس العلمي الذي هو العنصر الثاني من المرحلة الأولى لبناء المنهج. اما قيما يخص إجراءات البحث فقد اتبعت الخطوات التالية: يتألف مجتمع البحث من المدارس الثانوية والإعدادية والأساسية في مدينة بغداد المركز والتي تدرس مادة الكيمياء . تتألف عينة البحث : من مجتمع البحث من المدرسين والمدرسات لمادة كيمياء الصف الخامس العلمي بافتراض وجود عدد من المدرسين مساوي لعدد المدارس تم اختبار عدد منها بالطريقة العشوائية الطبقية فتم توزيع (150) استمارة بالطريقة العشوائية الطبقية مجتمع الاختصاصيين التربويين لمادة الكيمياء للصف الخامس العلمي وقد شملهم البحث جميعاً.
Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreHealthcare professionals routinely use audio signals, generated by the human body, to help diagnose disease or assess its progression. With new technologies, it is now possible to collect human-generated sounds, such as coughing. Audio-based machine learning technologies can be adopted for automatic analysis of collected data. Valuable and rich information can be obtained from the cough signal and extracting effective characteristics from a finite duration time interval that changes as a function of time. This article presents a proposed approach to the detection and diagnosis of COVID-19 through the processing of cough collected from patients suffering from the most common symptoms of this pandemic. The proposed method is based on adopt
... Show MoreThe current research aims to first - reveal the social repercussions of COVID-19 on women A - The impact of the epidemiological crisis on the social structure of the family B - Psychological and social pressures that women are exposed to during the Covid pandemic C - Social isolation resulting from the injury of a member Second - Understanding the health consequences of COVID-19 on women A- Mechanisms of differentiation in the treatment of Covid-19 treatment, home or hospital As for the limits of the research, the current research is determined by some private universities of students, female employees and teaching staff in Karkh district, which number eight (Al-Hikma, Al-Farahidi, Al-Farabi, Tigris, AlTurath, Al-Rashid, Al-Mashreq, Al-Nuso
... Show MoreThis research aims to identify and measure the role of TQM in the process of developing the financial performance of Diyala State Company and show the reality and obstacles, after applying the company's management to the requirements of ISO 9001: 2008 and compare it with its performance before applying this standard, The researcher measured the financial performance by conducting financial analysis of the financial statements and conducting a number of interviews at the company's headquarters, Diyala State Company (one of the Iraqi Ministry of Industry and Minerals formations) was sele
... Show MoreObjectives: The study aimed to evaluate health behavior, evaluate Health Action Process Approach, determine the effectiveness of the Health Action Process Approach based the application of program on students’ engaging in regular physical exercise.
Methodology: The research design for this study was a quasi-experimental. The study sample included high school male students, the final sample size was(160 ) Non-probability sampling (convenience sample) are chosen, (80) students study group and (80) students control group.
Results: The results show there was no statistically significant difference in the HAPA constructs among family's socioeconomic class groups and less tha
... Show MoreThe principle of rights and duties is part of the reform project of the Commander of the Faithful Ali ibn Abi Talib, to build a state of institutions whose foundations have been built on Quranic rules, a prophetic biography, and his diligence in doing so in accordance with the requirements of interests and evil, and his certainty in determining the most important and important, and research analytical study of speeches Imam Ali and his career, in this study (the principle of rights and duties) of the ruler and the parish because of their role in the reform process, which depends on the demolition and construction together, as it is the responsibility of the ruler to demolish all constructed corrupt and contrary to the principles of Islam
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreFor a long time, the intensification of profit represented a major goal for the company management ,but this goal confirmed a series of restrictions such the constriction on short period, the time rather than on long and medium strategic goal, the relationships with customers ,the supplies, employees , This goal is replaced by another one (intensification of the company's value) ,and the fortune of the share holders itself ,for the purpose of creating value, the company must generate great outcomes to cover the operating expense and to insure the a suitable compensation to the invested capital (the market value added) is the indication used to estimate the company ability to create value –added the development
... Show MoreThe objective of this in vivo study is to investigate the effects of 337.1 nm pulsed N2 laser on cellular immune response represented by lymphocyte transformation capacity and phagocytosis activity in laboratory animals. The samples include 60 adult male BALB/c mice, were divided into control group and experimental groups. The experimental groups were divided into two main groups according to the time period after N2 laser irradiation. Each group was divided into 9 subgroups which exposed to N2 laser radiation at different values of pulse repetition rates and exposure times. The results of immunological tests demonstrated that the exposure to 180 J/cm2 of N2 laser radiation induce adverse effect to cellular immune response. The results o
... Show MoreThis dissertation studies the application of equivalence theory developed by Mona Baker in translating Persian to Arabic. Among various translation methodologies, Mona Baker’s bottom-up equivalency approach is unique in several ways. Baker’s translation approach is a multistep process. It starts with studying the smallest linguistic unit, “the word”, and then evolves above the level of words leading to the translation of the entire text. Equivalence at the word level, i.e., word for word method, is the core point of Baker’s approach.
This study evaluates the use of Baker’s approach in translation from Persian to Arabic, mainly because finding the correct equivalence is a major challenge in this translation. Additionall
... Show More