Preferred Language
Articles
/
ZRa2qYcBVTCNdQwCQVoS
Learning Styles according to the Model of Felder & Silverman and its Relationship with Mathematical Self-perceived Efficacy to Students of the College of Education for Pure Sciences-Ibn Al-Haitham
...Show More Authors

This research aims toknow the learning styles according to the model of Felder and Silverman and its relationship to effectively self- perceived mathematicalamong students of the Faculty of Education Pure Sciences - Ibn al-Haytham. By answering the following questions: 1. What are the preferred methods of learning among students in the mathematics department according to the model Felder and Silverman? 2. What is the mathematicalself-perceived levelof the students at the Department of Mathematics effectiveness level? 3. What is the relationship between learning styles according to the Felder model and Silverman and the effectiveness of mathematical self-perceived of the students of the Department of Mathematics? The research sample consisted of 80 male and female students from the fourth grade students in the Department of Mathematics in the College of Education Pure Sciences - Ibn al-Haytham for the academic year 2015/2016. As for the two tools the first search tools is a measure of learning methods developed by (Felder and Silverman, 1988) Translation (Al-Zubaidi, 2015) which consisted of 44 items distributed on four areas: (practical - Contemplative) - (sensory - intuitive) - (optical -pronunciation) - (sequential - total).And the second tool and is a measure of the effectiveness of sports self-perceived, which consists of a paragraph (30), were reliability and validity account and conducted statistical analyzes to calculate the difficulty and ease transactions. After the use of appropriate statistical methods to analyze the results, the results indicated that (1) 37.5% of the students have more than one level indicating no preference for any style of learning. (2) 30% of the students' own (visual - verbal)method (3) 16.25% of the students' own (sensory - intuitive)method. (4) 11.25% of the students' own (sequential - total)method. (5) 5% of the students' own (practical - Contemplative)method. (6) Students did not prefer any of the styles (intuitive - verbal - total). (7) the students in grade IV Department of Mathematics in the College of Education Pure Sciences / Ibn alHaytham students have aware of the effectiveness of mathmatics. (8) There is no relationship between the learning styles according to the model Felder and Silverman and the effectiveness of sports self-conscious of the students of the Department of Mathematics Therefore, the researcher recommends that students should be aware of the methods and activities that are compatible with their learning methods, as well as the development of their perceived mathematical effectiveness to enhance their ability to solve any mathematical task, no matter how difficult and flexible it may be.In the light of the results of the research, a number of proposals were developed.

Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Mon Dec 11 2017
Journal Name
Al-khwarizmi Engineering Journal
Experimental and Numerical Research on Flow-Induced Vibration in Valves
...Show More Authors

Abstract  

All central air conditioning systems contain piping system with various components, sizes, material, and layouts. If such systems in operating mode, the flow in piping system and its component such as valves can produce severe vibration due to some flow phenomenon’s. In this research, experimental measurements and numerical simulation are used to study the flow-induced vibration in valves. Computational fluid dynamics (CFD) concepts are included with one-way and two-way fluid-structure interaction concepts by using finite element software Package (ANSYS 14.57). Detection analysis is performed on flow characteristics under operation conditions and relations with structural vibration. Most of

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Sep 01 2024
Journal Name
Baghdad Science Journal
Some Results about Acts over Monoid and Bounded Linear Operators
...Show More Authors

 الأثر V بالنسبة إلى   sinshT و خواصه قد تم دراسته في هذا البحث حيث تم دراسة علاقة الأثر المخلص والاثر المنتهى التولد والاثر المنفصل وربطها بالمؤثرات المتباينة حيث تم بهنة العلاقات التالية ان الاثر اذا وفقط اذا مقاس في حالة كون المؤثر هو عديم القوة وكذلك في حالة كون المؤثر شامل فان الاثر هو منتهي التولد اي ان الغضاء هو منتهي التولد وايضا تم برهن ان الاثر مخلص لكل مؤثر مقيد وك\لك قد تم التحقق من انه لاي مؤثر مقي

... Show More
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Mar 26 2021
Journal Name
Oral Diseases
Association between maternal periodontitis, acute‐phase reactants and preterm birth
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jun 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Carbonized Copolymers Nonwoven Nanofibers Composite: Surface Morphology and Fibers Orientation
...Show More Authors

Carbonized nonwoven nanofibers composite were fabricated using the electrospinning method of a polymeric solution composite followed by heat treatment including stabilization and calcination steps. The spun polymeric solution was a binary polymer mixture/organic solvent. In this study, two types of polymers (Polymethylmethacrylate (PMMA) and Polyethylene glycol (PEG)) were used separately as a copolymer with the base polymer (Polyacrylonitrile (PAN)) to prepare a binary polymer mixture in a mixing ratio of 50:50. The prepared precursor solutions were used to prepare the precursor nanofibers composite (PAN: PMMA) and (PAN: PEG).  The fabricated precursors nonwoven fibers composite were stabilized and carbonized to produce carbon nonw

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Nov 01 2012
Journal Name
2012 International Conference On Advanced Computer Science Applications And Technologies (acsat)
Data Missing Solution Using Rough Set theory and Swarm Intelligence
...Show More Authors

This paper presents a hybrid approach for solving null values problem; it hybridizes rough set theory with intelligent swarm algorithm. The proposed approach is a supervised learning model. A large set of complete data called learning data is used to find the decision rule sets that then have been used in solving the incomplete data problem. The intelligent swarm algorithm is used for feature selection which represents bees algorithm as heuristic search algorithm combined with rough set theory as evaluation function. Also another feature selection algorithm called ID3 is presented, it works as statistical algorithm instead of intelligent algorithm. A comparison between those two approaches is made in their performance for null values estima

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Sep 30 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Performance Comparison between Recycled Single Stage and Double Stage Hydrocyclones
...Show More Authors

   This research presents a comparison of performance between recycled single stage and double stage hydrocyclones in separating water from water/kerosene emulsion. The comparison included several factors such as: inlet flow rate (3,5,7,9, and 11 L/min), water feed concentration (5% and 15% by volume), and split ratio (0.1 and 0.9). The comparison extended to include the recycle operation; once and twice recycles. The results showed that increasing flow rate as well as the split ratio enhancing the separation efficiency for the two modes of operation. On the contrary, reducing the feed concentration gave high efficiencies for the modes. The operation with two cycles was more efficient than one cycle. The maximum obtained effici

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Oct 01 2008
Journal Name
Journal
Acanthosis Nigricans in Iraqi Patients Clinical, Histopathological and Theraputic Study
...Show More Authors

KE Sharquie, AA Noaimi, AH Muhammad Ali, 2008 - Cited by 3

View Publication