The aim of the current research is to develop the social studies curriculum at the primary stage in light of the standards of the next generation, which was represented in three main dimensions (pivotal ideas, scientific practices, and comprehensive concepts). The researcher designed a tool for the study, which is a content analysis card in the light of (NGSS) standards, based on the previous main dimensions. The descriptive analytical approach was adopted in analyzing the social studies curriculum for the primary stage to determine the degree to which the standards of the next generation are available, as well as to establish the theoretical framework related to the research variables. To develop the social studies curriculum in light o
... Show MoreThis study has came as a result to discover on the references of the educational theories which leads the professors in the educational art departments in the Iraqi universities through knowing these ideological references indeed in an important slice of the society. This slice is: the members of professoriate. The study goal knows the ideological references to these theories for the professors in these departments.
In order to approve the research's goals. The researcher has selected a sample contains (50) professoriate members in these departments in the Iraqi universities which they have the educational art profession among the next scientific degrees (assistant teacher. teacher. assistant professor & professor).
The resea
The theater has live foundations that interact with all symbols and signs. It has never been far from these innovations and developments in the manner of dealing with those symbols and how and the extent of their effects on society through the world of technology because the theatrical performance contributes to its structure, a technique that is employed by designers in various technologies such as ( Music, lighting and sound effects engineer, as well as fashion designer, architecture, and modeling designer). The theater today also relied on various interactive techniques represented in the use of body language and a sign in order to communicate the meaning by forming movements, singing and dancing in order for the recipient to interact
... Show MoreThe difference The doctrines of the four jurists were built in Achieving the purposes of Tesper in Islam
This research investigates the subject of the impact of wars (as a manifestation of crisis) on architecture, and the extent of continuing wars physical and moral results of wars, even after the end of the cause of the crisis. The impact of different rebuilding which exposed to the effects of the war seems different in crisis regions.
The problem of research is about the uncertainty of the impact of the way chooses for reconstructing the buildings after wars in the continuity of the crisis of war. The goals of this research are to clarify the influence of methods of reconstruction of buildings in a city chosen which is Beirut, on the continuation of the war crisis with the argument of demolishing and rebuilding newly or keeping tr
... Show MoreThe propaganda war is one of the most dangerous weapons used in various conditions of war and peace within any intellectual, political or military conflict to be targeted by multiple social groups and their effects on the intellectuals to change the viewpoints at the local and global level, including the use of technical treatment of the audio and visual medium, The impact of the psychological dimensions of the arms in the confrontation and spread terror in the ranks of the enemies and in the forefront of what Iraq faces in its battle against the And the use of it as a propaganda content contributes to the development of the spirit of tranquility and tranquility in the hearts of Iraqis and the return of the right to the owners “th
... Show MoreThe letters are exposed in some texts of the classical Arabic language (poetry or prose), or in some of the Qur’anic texts, which are the main sources that were adopted on the day when provisions, rules and linguistic controls were established. I say that some of these letters are exposed in some contexts to deletion, mention, or change in the structure and shape of the letter. As for the omission, it is one of the aspects that distinguished Arabic, as well as other languages, for many purposes that differ among their user.
ABSTRACT
The research aims to clarify the role of electronic marketing and what it can achieve in promoting the products of the national industry in Iraq. Marketing channel depends on modern communication and information technology that industrial and metal companies can use in promoting and selling their products along with traditional marketing outlets. To achieve the objectives of the research, a questionnaire was used, which consists of three axes, the first includes the personal data of the sample (gender, age, educational attainment, place of residence, marital status, income level), while the second axis includes various questions about the products of the national industry. Third axis includes que
... Show MoreBackground: Radioactive iodine-131 therapy is highly effective in treating patients with hyperthyroidism. An ablative dose is preferred by a number of endocrinologists, and, a fixed dose protocol seems to be better than a calculated dose in real practice.
Objective: To check for hypothyroidism in hyperthyroid patients one year after RAI therapy, comparing between the results of high ablative versus usual dosages of RAI-131.
Methods: This study included 174 hyperthyroid patients, 101 males and 73 females, divided into 2 groups, the first consisted of 162 patients given a usual fixed dose of RAI while the second consisted of 12 patients given a high fixed ablati
... Show MoreOptical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show More