The research aims to know (the effect of the pdeode strategy) in acquiring historical concepts among the fourth-grade literary female students in the history module. To achieve the goal of this research, the following null hypothesis was formulated. There is no statistically significant difference at the level of (0.05) between the average scores of the experimental group students, who study history according to the PDEODE strategy, and the average scores of the control group students who study the same module in the traditional way of the historical concepts acquisition test.The researcher chose the experimental method for the current research and adopted the experimental design of partial control with a post-test, which depends on the experimental group that is taught using the pdeode strategy, while the control group studied using the traditional method. The research sample comprised of (60) female students, including (30) female students in the experimental group, and another (30) female students in the control group.The researcher equated the two groups in (IQ test, chronological age calculated in months), then the researcher tried to control a number of extraneous variables that may affect the dependent variable. As for the scientific material, it included the topics of the chapters (first, second, third, fourth and fifth) of the history textbook to be taught for the academic year 2018/2019, and the researcher personally taught the two research groups during the first semester...
The period of the reign of King Ghazi saw many disorders in most parts of the country and the management disrupted and imbalanced, besides tribal unrests and political conflict and collision with British interests, Such as bad management in some regions and loss of government control over some administrative units, due to the position of the weak governments towards these problems, so it was necessary to change these Governments and Ministers to solve such problems. In contrast, the Iraqi government has focused on the army as the basis for a strong state and the protector on the existence of an external threat for the safety of the country, King Ghazi has helped in the development of competencies of the military, bringing the officers ex
... Show MoreThis research deals with the use of a number of statistical methods, such as the kernel method, watershed, histogram and cubic spline, to improve the contrast of digital images. The results obtained according to the RSME and NCC standards have proven that the spline method is the most accurate in the results compared to other statistical methods
DBNRAAK Mohammed, International Journal of Research in Social Sciences and Humanities, 2020
Language is essential for politics, for producing, disseminating, engaging with, and reacting to political discourse. The pragmatics of political speeches is crucial to the development of effective political communication tactics. Thus, speech is situated at the intersection of rhetoric, linguistics, and politics. In communication, intent is a pragmatic factor that plays a crucial role at the time of the communication process. Speech is of paramount importance to the social and political domains. Through the use of concepts and the relationship between language and politics, the study analyzes the function of language in communication and interpretation of intentions. The study of the relationships between language and the situations in whi
... Show MoreDespite recent attempts to improve safety in the construction sector, this sector is considered dangerous and unsafe. Iraq is one of the emerging nations that suffers from a lack of construction safety management. In 2018, the construction sector in Iraq was responsible for 38% of all industrial accidents. Creating a safety program minimizes this problem by making safety an intrinsic part of construction projects. As a result, this article aims to identify the crucial safety factors that affect the safety performance in Iraqi construction projects. After conducting a critical literature review of the related literature, a list of 35 sub-factors classified into nine categories of main factors was chosen to rank each facto
... Show MoreA composite section is made up of a concrete slab attached to a steel beam by means of shear connectors. Under positive and negative bending moment, part of the slab will act as a flange of the beam, resisting the longitudinal compression or tension force. When the spacing between girders becomes large, it is evident that the simple beam theory does not strictly apply because the longitudinal stress in the flange will vary with distance from the girder web, the flange being more highly stressed over the web than in the extremities. This phenomenon is termed "shear lag". In this paper, a nonlinear three-dimensional finite element analysis is employed to evaluate and determine the actual effective slab width of the composite steel-concrete
... Show MoreThis investigation was undertaken to evaluate the effectiveness of using Hydrated lime as a (partial substitute) by weight of filler (lime stone powder) with five consecutive percentage namely (1.0, 1.5, 2.0, 2.5, 3.0) % by means of aggregate treatment, by introducing dry lime on dry and 2–3% Saturated surface aggregate on both wearing and binder coarse. Marshall design method, indirect tensile test and permanent deformation under repeated loading of Pneumatic repeated load system at full range of temperature (20, 40, 60) C0 were examined The study revealed that the use of 2.0% and 1.5 % of dry and wet replacement extend the pavement characteristics by improving the Marshall properties and increasing the TSR%. Finally, increase permanent
... Show MoreCloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize
... Show More