Preferred Language
Articles
/
abaa-749
MOTIVES FOR STUDENTS TO BE EXPOSED TO EDUCATIONAL PROGRAMS ON TV CHANNELS (Iraqi educational channels as a model)
...Show More Authors

The educational function of television is one of the basic functions in light of the technical development that included the specialized satellite channels in all its fields, including the educational field, as its role became parallel to the role of educational institutions. These studies are among the descriptive studies in terms of the type of study methodology that describes the phenomenon, interprets its and extract the results and relationships between the variables. The study sample was multistage (random and intentional) included the students of the sixth academic and literary preparatory stage in the city of Baghdad.
The study problem was summarized by the following main question:
( What are the motives for the exposure of the students of Baghdad to the Iraqi educational channels ? What is the extent of the gratifications that have been achieved as a result of this exposure?).
Leading to the secondary questions that branched from it, the most important of which are:
- What are the habits and patterns of students' follow-up and educational programs in the Iraqi educational satellite channel?
- What are the motives for students' exposure to educational lessons in the Iraqi educational satellite channel?
- The study reached several results that can be summarized as follows:
- The high degree of exposure of the student population to the Iraqi educational satellite programs, especially for the students of the completed classes, thus achieving the result of the assumption (that the audience of the recipients is an active audience and its use of the media is a deliberate use to achieve a certain benefit).
- The results showed that the program plans included the preparation and broadcast of enrichment programs to address various issues and activities of interest to the student group, such as a targeted audience from the satellite channel?
The results indicated the high level of utilitarian motivations at the level of ritual motives of the study sample while they were following the educational channels of Iraq, including the adoption of the interesting method of providing educational lessons, as the extent of follow-up increased exponentially with a high degree of benefit from the contents of these programs.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Opcion, Año
The effect of the -Zahorik- model on acquiring grammatical concepts among students of the College of Administration and Economics/University of Baghdad
...Show More Authors

Publication Date
Sun Sep 15 2019
Journal Name
Al-academy
Intellectual and Aesthetic Relationship between the Public and the Modern Theater (the play Oh Lord!) as a model: فيصل عبد عودة
...Show More Authors

The issue of the public in the directions and theories of the theater director in the world theater, especially after the emergence of realism and the crystallization of the term direction and the definition of the role of the director in 1850 AD by the Duke Max Mengen took different paths to the Greek, Roman and even Elizabethan audience because it was here subjected to the theatrical equation from  its production and presentation due to the fact that the  theatrical performance is a technical artistic production, and the audience participation, watching and consumption, and here the participation of the audience was subjected to three directions:  the enlightenment in the sense of arousing sense, the incitement in the se

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Institutional Performance Assessment using a model of the European Foundation for Quality Management (EFQM) A case study at an organization
...Show More Authors

The study aims to use the European Excellence Model (EFQM) in assessing the institutional performance of the National Center for Administrative Development and Information Technology in order to determine the gap between the actual reality of the performance of the Center and the standards adopted in the model, in order to know the extent to which the Center seeks to achieve excellence in performance to improve the level of services provided and the adoption of methods Modern and contemporary management in the evaluation of its institutional performance.

The problem of the study was the absence of an institutional performance evaluation system at the centre whereby weaknesses (areas of improvement) and st

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 07 2013
Journal Name
Journal Of Educational And Psychological Researches
Role the media to limit from get games children instigator on the violence
...Show More Authors

Violence is a very serious phenomenon affecting the upbringing and culture kids, are playing the most violent forms of development of these Phenomenon, the research aims to determine the role of the media in reducing violence, and conducted a field study on parents Children by 200 form, the results revealed the importance of the media in raising awareness of the risks of violence on the child  Especially television, which hugely increased Show features, as well as the role of parents in guiding the child to buy Useful because the game to play negative impact of violence on children's health, and the media play an important role in raising awareness of these Risks through educational programs and television commercials, and o

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 22 2022
Journal Name
College Of Islamic Sciences
The issues of illusion to Ibn hisham AI- Ansari( H 761T) on grammarian
...Show More Authors

This research shows the issues of Ibn Hisham's illusion in its leadership of the grammarians; As Ibn Hisham attributed - during his presentation of grammatical issues - grammatical opinions to a number of grammarians claiming them in them, and after referring to the main concepts that pertain to those grammarians, we found that Ibn Hisham had delusional in those allegations, in addition to that clarifying the terms illusion and claim in the two circles of language And the terminology, and perhaps the most prominent result in this research is that he worked to investigate these issues by referring to their original sources, with an explanation of the illusions of Ibn Hisham in his attribution to these issues.

View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Civil Engineering Journal
Calibration of a New Concrete Damage Plasticity Theoretical Model Based on Experimental Parameters
...Show More Authors

The introduction of concrete damage plasticity material models has significantly improved the accuracy with which the concrete structural elements can be predicted in terms of their structural response. Research into this method's accuracy in analyzing complex concrete forms has been limited. A damage model combined with a plasticity model, based on continuum damage mechanics, is recommended for effectively predicting and simulating concrete behaviour. The damage parameters, such as compressive and tensile damages, can be defined to simulate concrete behavior in a damaged-plasticity model accurately. This research aims to propose an analytical model for assessing concrete compressive damage based on stiffness deterioration. The prop

... Show More
Scopus (14)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (14)
Crossref (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Estimation of a Parallel Stress-strength Model Based on the Inverse Kumaraswamy Distribution
...Show More Authors

   

 The reliability of the stress-strength model attracted many statisticians for several years owing to its applicability in different and diverse parts such as engineering, quality control, and economics. In this paper, the system reliability estimation in the stress-strength model containing Kth parallel components will be offered by four types of shrinkage methods: constant Shrinkage Estimation Method, Shrinkage Function Estimator, Modified Thompson Type Shrinkage Estimator, Squared Shrinkage Estimator. The Monte Carlo simulation study is compared among proposed estimators using the mean squared error. The result analyses of the shrinkage estimation methods showed that the shrinkage functions estimator was the best since

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref