This research basically gives an introduction about the multiple intelligence
theory and its implication into the classroom. It presents a unit plan based upon the
MI theory followed by a report which explains the application of the plan by the
researcher on the first class student of computer department in college of sciences/
University of Al-Mustansiryia and the teacher's and the students' reaction to it.
The research starts with a short introduction about the MI theory is a great
theory that could help students to learn better in a relaxed learning situation. It is
presented by Howard Gardener first when he published his book "Frames of
Minds" in 1983 in which he describes how the brain has multiple intelligences not
only one general intelligence as it was believed before.He classifies these
intelligences into six or ten intelligences as will be explained later in this research.
The next section is a unit plan which is designed in accordance with the MI
theory for teaching the simple present and the present perfect tense for the first
class students in computer department of college of sciences. This plan consists of
four activities each involves more than three intelligences which suppose to help
most of the students in the class to learn better, each using their own intelligence in
learning. In all the activities, the students are supposed to work in groups.
Activity number one is teaching the simple present tense by writing a
description of pictures taken from the net using the simple present tense.
Activity number two is teaching the present perfect tense by using a game
called: "tell us what has happened". The teacher or groups of students do something
and then the teacher asks the other students to tell what has happened.
The third activity is teaching the simple present tense by using songs which
are taken from the net and designed for teaching purposes. These songs are
followed by a cloze sheet about the song to be filled by the students using the
simple present tense.
The fourth activity is teaching the present perfect tense using the
questionnaire. Students ask and answer using the present perfect tense as the
teacher gives each group a specific theme to talk about.
presents the teacher's reaction to using the MI theory in designing the unit
plan and teaching it to the students and the students' reaction to the unit plan with the type of assessments according to the MI theory which is followed by the researcher to assess the students.
The competition in the hotel sector, globalization and the development of new information have forced the sector to continuously seek new techniques and arrangements to remain competitive through hotel industry companies, including Benchmarking and the application of this method in the hotel sector. The selection of the Rashid International Hotel by the Ministry of Tourism as a leading hotel or benchmark for comparison of other hotels in Iraq, and the selection of two hotels in Baghdad for comparison, namely (Ishtar International Hotel, Baghdad International Hotel) and the choice also by the Ministry of Tourism, N is to correct the course of practice to manage the cost and diagnosis of the weakness of the strengths and weaknesses in the
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreVisible light communication (VLC) is an upcoming wireless technology for next-generation communication for high-speed data transmission. It has the potential for capacity enhancement due to its characteristic large bandwidth. Concerning signal processing and suitable transceiver design for the VLC application, an amplification-based optical transceiver is proposed in this article. The transmitter consists of a driver and laser diode as the light source, while the receiver contains a photodiode and signal amplifying circuit. The design model is proposed for its simplicity in replacing the trans-impedance and transconductance circuits of the conventional modules by a simple amplification circuit and interface converter. Th
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreThe futuristic age requires progress in handwork or even sub-machine dependency and Brain-Computer Interface (BCI) provides the necessary BCI procession. As the article suggests, it is a pathway between the signals created by a human brain thinking and the computer, which can translate the signal transmitted into action. BCI-processed brain activity is typically measured using EEG. Throughout this article, further intend to provide an available and up-to-date review of EEG-based BCI, concentrating on its technical aspects. In specific, we present several essential neuroscience backgrounds that describe well how to build an EEG-based BCI, including evaluating which signal processing, software, and hardware techniques to use. Individu
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables