Preferred Language
Articles
/
_xYIpocBVTCNdQwCqlnR
A training program based on integrating futuristic thinking skills with classroom interaction patterns and its effect on the academic self- efficacy of mathematics teachers
...Show More Authors

The research aims to identify the effect of the training program that is based on integrating futuristic thinking skills with classroom interaction patterns on mathematics teachers in order to provide their students with creative solution skills. The research sample consisted of 31teachers (15 teachers for the experimental group and 16 for the control groups). The researcher developed a measure for the academic self-efficacy consisting of (39) items. Its validity, reliability, coefficient of difficulty and discriminatory power were estimated. To analyze the findings, the researcher adopted the Mann-Whitney (U) test and the effect size, and the findings were as follows: There is a statistically significant difference at the significance level of (0.05) between the average scores of mathematics teachers of the experimental group and the control group on the academic self-efficacy scale.

Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Political Sciences Journal
The Chinese Economy and its impact on international trade (Study on the role of the port of Gwadar)
...Show More Authors

China's economic policy and its huge capabilities operate according to an expansion strategy, especially in investing foreign projects, as the past ten years have witnessed a major development in the elements of comprehensive strength, especially in the economic field, in 2014 China launched the largest initiative in the world, represented by the Belt and Road Project (BRI), which links nearly 70 countries, through this project, a very important region has emerged, which is (the port of cadres) in Pakistan, as China has headed towards that region and given the highest importance that is in its interest in the first place regardless of the great Pakistani interest, This is consistent with its future aspirations, especially after breaking

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Educational And Psychological Researches
The effect of (SWOM) strategy on acquiring the psychological concepts of educational psychology course and its retention among education college students
...Show More Authors

The current study aims to investigate the effect of (SWOM) strategy on acquiring the psychological concepts of educational psychology course and its retention among education college students. To do this, a sample of (57) male and female student were intentionally selected from first grade, Kurdish department / college of education / Ibin Rushd of human sciences. The sample distributed on two classes, whereby the experimental group consisted of (28) student were taught according to the (SWOM) strategy while the control group made up of (29) student were taught based on the tradition method. The two researchers designed a scale included (50) item to measure students' achievement. The experiment lasted for ten weeks, SPSS was used

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
International Journal Of Chem Tech Research
Synthesis of New Selective Electrodes for the Determination of Metronidazole Benzoate (MNZB) Based on a Molecularly Imprinted Polymer Combined With Poly Vinyl Chloride
...Show More Authors

Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Clinical And Experimental Dentistry
The effect of osseodensification on implant stability and bone density: A prospective observational study
...Show More Authors

Background: The aims of this study were to evaluate the effect of implant site preparation in low-density bone using osseodensification method in terms of implant stability changes during the osseous healing period and peri-implant bone density using CBCT. Material and methods: This prospective observational clinical study included 24 patients who received 46 dental implants that were installed in low-density bone using the osseodensification method. CBCT was used to measure the bone density pre- and postoperatively and implant stability was measured using Periotest® immediately after implant insertion and then after 6 weeks and 12 weeks postoperatively. The data were analyzed using paired t-test and the probability value <0.05 was conside

... Show More
View Publication
Scopus (20)
Crossref (20)
Scopus Crossref
Publication Date
Fri Mar 28 2008
Journal Name
Ama, Agricultural Mechanization In Asia, Africa & Latin America
The Effect of Two Type of Plows With Four Speeds on the Field Capacity and Bulk Density
...Show More Authors

Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Block Ciphers Analysis Based on a Fully Connected Neural Network
...Show More Authors

With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the

... Show More
View Publication Preview PDF
Crossref (2)
Crossref