This research aims toknow the learning styles according to the model of Felder and Silverman and its relationship to effectively self- perceived mathematicalamong students of the Faculty of Education Pure Sciences - Ibn al-Haytham. By answering the following questions: 1. What are the preferred methods of learning among students in the mathematics department according to the model Felder and Silverman? 2. What is the mathematicalself-perceived levelof the students at the Department of Mathematics effectiveness level? 3. What is the relationship between learning styles according to the Felder model and Silverman and the effectiveness of mathematical self-perceived of the students of the Department of Mathematics? The research sample consisted of 80 male and female students from the fourth grade students in the Department of Mathematics in the College of Education Pure Sciences - Ibn al-Haytham for the academic year 2015/2016. As for the two tools the first search tools is a measure of learning methods developed by (Felder and Silverman, 1988) Translation (Al-Zubaidi, 2015) which consisted of 44 items distributed on four areas: (practical - Contemplative) - (sensory - intuitive) - (optical -pronunciation) - (sequential - total).And the second tool and is a measure of the effectiveness of sports self-perceived, which consists of a paragraph (30), were reliability and validity account and conducted statistical analyzes to calculate the difficulty and ease transactions. After the use of appropriate statistical methods to analyze the results, the results indicated that (1) 37.5% of the students have more than one level indicating no preference for any style of learning. (2) 30% of the students' own (visual - verbal)method (3) 16.25% of the students' own (sensory - intuitive)method. (4) 11.25% of the students' own (sequential - total)method. (5) 5% of the students' own (practical - Contemplative)method. (6) Students did not prefer any of the styles (intuitive - verbal - total). (7) the students in grade IV Department of Mathematics in the College of Education Pure Sciences / Ibn alHaytham students have aware of the effectiveness of mathmatics. (8) There is no relationship between the learning styles according to the model Felder and Silverman and the effectiveness of sports self-conscious of the students of the Department of Mathematics Therefore, the researcher recommends that students should be aware of the methods and activities that are compatible with their learning methods, as well as the development of their perceived mathematical effectiveness to enhance their ability to solve any mathematical task, no matter how difficult and flexible it may be.In the light of the results of the research, a number of proposals were developed.
This search has introduced the techniques of multi-wavelet transform and neural network for recognition 3-D object from 2-D image using patches. The proposed techniques were tested on database of different patches features and the high energy subband of discrete multi-wavelet transform DMWT (gp) of the patches. The test set has two groups, group (1) which contains images, their (gp) patches and patches features of the same images as a part of that in the data set beside other images, (gp) patches and features, and group (2) which contains the (gp) patches and patches features the same as a part of that in the database but after modification such as rotation, scaling and translation. Recognition by back propagation (BP) neural network as com
... Show MoreThe type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No
... Show MoreObjectives: The study aim was to explore the knowledge, perceptions, and attitudes of Iraqi physicians regarding generic and locally manufactured medicines. Methods: A total of 124 physicians were involved in this cross -sectional study. The convenience sample was collected from five public hospitals in Baghdad. A self-administered questionnaire was distributed and collected in-person. Fisher's Exact Test was used to measure the association between physician years of experience, gender and categorical (perception and knowledge) variables. Results: Most respondent answers regarding the knowledge of generic medicines were incorrect. Only up to one-third of the participants knew that generic medicines are therapeutically eq
... Show MoreAW Tarik, AW Ali T, A Salah, Journal of faculity of medicine Baghdad university, 2014 - Cited by 3
Background: Hormonal changes during pregnancy have been suggested to predispose women to gingivitis. Furthermore, advance periodontal infection in pregnant women may pose a threat to the placenta and uterus and may increase the like hood of preterm delivery. The aim of this study was to investigate the effect of salivary interleukin -6 (IL-6) level and periodontal health among preterm postpartum women. Materials and Methods: Salivary samples were taken from 33 preterm postpartum women (study group) and 33 full term postpartum women (control group). The supernatant salivary samples were assayed using atomic absorption spectrophotometer. Plaque, calculus and gingival indices were used for recording the oral hygiene and gingivitis also probing
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show More