The current research aims at knowing the impact of the mind-clearing method in teaching second year intermediate students “reading book”. To achieve the study objective, the researchers intentionally chose Arjwan middle school, located in Baghdad Directorate of Education Al-Rusafa/2, which includes five classes for the second intermediate class. Division (A) was chosen randomly to represent the experimental group, which is taught in the mind-clearing method, while Division (B) represented the control group, which is taught in the traditional way. The sample of the research included (79) female students divided into (39) students in the experimental group, and (40) female students in the control group.To achieve the objective of the research, the researchers put the following null hypothesis:There is no statistically significant difference between the average scores of the experimental group students who study (reading) according to the mind-clearing method, and the average scores of the control group students who study (reading) according to the traditional method. The researchers rewarded the students of the two research groups in the following variables: chronological age calculated in months, Arabic language subject grades for the previous year (2016/2017), and parents’ academic achievement. The researchers employed the t-test for two independent samples (t-test) to find out the significance of the difference at the level (0.05) between the two research groups according to the traditional method.
Shapes have differed in terms of their temporality, tools, technical variations, aesthetic functions and dimensions. The beginnings started with manual primitive techniques that have played an a significant artistic role in the ancient civilizations, then developed with the technological development and the digital technologies that encompassed various programs and specialist means in the graphic design, so that its visual outputs in the textbook that is considered a communication means that has an effect and attracts the recipient. That is what made the researcher search and investigate this topic describing the research problem as follows: What are the shapes as alternatives to the words in the design of the textbook? The research obje
... Show MoreThis paper is devoted to an inverse problem of determining discontinuous space-wise dependent heat source in a linear parabolic equation from the measurements at the final moment. In the existing literature, a considerably accurate solution to the inverse problems with an unknown space-wise dependent heat source is impossible without introducing any type of regularization method but here we have to determine the unknown discontinuous space-wise dependent heat source accurately using the Haar wavelet collocation method (HWCM) without applying the regularization technique. This HWCM is based on finite-difference and Haar wavelets approximation to the inverse problem. In contrast to othe
The dye–semiconductor interface between N749 sensitized and zinc semiconductor (ZnSe) has been investigated and studied according to quantum transition theory with focusing on the electron transfer processes from the N749 sensitized (donor) to the ZnSe semiconductor (acceptor). The electron transfer rate constant and the orientation energy were studied and evaluated depended on the polarity of solvents according to refractive index and dielectric constant coefficient of solvents and ZnSe semiconductor. Attention focusing on the influence of orientation energies on the behavior of electron transfer rate constant. Differentdata of rate constant was discussion with orientation energy and effective driving energy for N749-ZnSe system.
... Show MoreAlice Walker's novel The Color Purple1983, whose events take place in the rural Georgia and addresses the most important issues in the early 20thcentury; like male dominant society and women submission to men, weaves a mosaic picture of male-female relationships. Black men like Alphonso, Albert and Harpo are portrayed as oppressors, cruel and they exercise power and violence over their wives and daughters. Through the negative portrayal of black male characters, Walker is accused to be a men hating writer because she ''Views oppression as an essentially masculine activity which springs from the male's aggressive need to dominate. In the novel, man is the premium mobile, the one by whom and t
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe current study uses the flame fragment deposition (FFD) method to synthesize carbon nanotubes (CNTs) from Iraqi liquefied petroleum gas (LPG), which is used as a carbon source. To carry out the synthesis steps, a homemade reactor was used. To eliminate amorphous impurities, the CNTs were sonicated in a 30 percent hydrogen peroxide (H2O2) solution at ambient temperature. To remove the polycyclic aromatic hydrocarbons (PAHs) generated during LPG combustion, sonication in an acetone bath is used. The produced products were investigated and compared with standard Multi-walled carbon nanotube MWCNTs (95%), Sigma, Aldrich, using X-ray diffraction (XRD), thermo gravimetric analysis (TGA), Raman spectroscopy, scanning el
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More