Preferred Language
Articles
/
jcoeduw-817
A Unit Plan Based Upon The MI Theory: A theoretical study with an application Inside The Classroom
...Show More Authors

This research basically gives an introduction about the multiple intelligence
theory and its implication into the classroom. It presents a unit plan based upon the
MI theory followed by a report which explains the application of the plan by the
researcher on the first class student of computer department in college of sciences/
University of Al-Mustansiryia and the teacher's and the students' reaction to it.
The research starts with a short introduction about the MI theory is a great
theory that could help students to learn better in a relaxed learning situation. It is
presented by Howard Gardener first when he published his book "Frames of
Minds" in 1983 in which he describes how the brain has multiple intelligences not
only one general intelligence as it was believed before.He classifies these
intelligences into six or ten intelligences as will be explained later in this research.
The next section is a unit plan which is designed in accordance with the MI
theory for teaching the simple present and the present perfect tense for the first
class students in computer department of college of sciences. This plan consists of
four activities each involves more than three intelligences which suppose to help
most of the students in the class to learn better, each using their own intelligence in
learning. In all the activities, the students are supposed to work in groups.
Activity number one is teaching the simple present tense by writing a
description of pictures taken from the net using the simple present tense.
Activity number two is teaching the present perfect tense by using a game
called: "tell us what has happened". The teacher or groups of students do something
and then the teacher asks the other students to tell what has happened.
The third activity is teaching the simple present tense by using songs which
are taken from the net and designed for teaching purposes. These songs are
followed by a cloze sheet about the song to be filled by the students using the
simple present tense.
The fourth activity is teaching the present perfect tense using the
questionnaire. Students ask and answer using the present perfect tense as the
teacher gives each group a specific theme to talk about.
presents the teacher's reaction to using the MI theory in designing the unit
plan and teaching it to the students and the students' reaction to the unit plan with the type of assessments according to the MI theory which is followed by the researcher to assess the students.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Iraqi Journal For Electrical And Electronic Engineering
A Systematic Review of Brain-Computer Interface Based EEG
...Show More Authors

The futuristic age requires progress in handwork or even sub-machine dependency and Brain-Computer Interface (BCI) provides the necessary BCI procession. As the article suggests, it is a pathway between the signals created by a human brain thinking and the computer, which can translate the signal transmitted into action. BCI-processed brain activity is typically measured using EEG. Throughout this article, further intend to provide an available and up-to-date review of EEG-based BCI, concentrating on its technical aspects. In specific, we present several essential neuroscience backgrounds that describe well how to build an EEG-based BCI, including evaluating which signal processing, software, and hardware techniques to use. Individu

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Sun Dec 31 2023
Journal Name
International Journal On Technical And Physical Problems Of Engineering
A Multiple System Biometric System Based on ECG Data
...Show More Authors

A Multiple System Biometric System Based on ECG Data

Scopus (1)
Scopus
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Pixel Based Techniques for Gray Image Compression: A review
...Show More Authors

Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Cogent Engineering
Content-based image retrieval: A review of recent trends
...Show More Authors

View Publication
Scopus (128)
Crossref (114)
Scopus Clarivate Crossref
Publication Date
Tue Jun 14 2022
Journal Name
Chemical Papers
Nile red based dye D–π–A as a promising material for solar cell applications
...Show More Authors

A recently reported Nile red (NR) dye conjugated with benzothiadiazole species paves the way for the development of novel organic-based sensitizers used in solar cells whose structures are susceptible to modifications. Thus, six novel NR structures were derived from two previously developed structures in laboratories. In this study, density functional theory (DFT) calculations and time-dependent DFT (TD-DFT) were used to determine the optoelectronic properties of the NR-derived moieties such as absorption spectra. Various linkers were investigated in an attempt to understand the impact of π-linkers on the optoelectronic properties. According to the findings, the presence of furan species led to the planarity of the molecule and a reduction

... Show More
View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Diversity of Management Practices of Human Resources and their Impact on Entrepreneurship in Universities: A Field Study in Public Jordanian Universities
...Show More Authors

The purpose of this study is to examine the effect of human resource diversity management practices on achieving entrepreneurship in Jordanian public universities. To achieve the aims of the study, a well-designed questionnaire was used for collecting data. The population of the study was (7433) faculty members (including different ranks such as professors, associate professors, assistant professors and lecturers) in Jordanian public universities. The study sample was selected through the use of a random sample, the questionnaire is distributed to a sample (of 400 with the percentage of 5%) selected by using a random sampling (350) copies of the questionnaire were collected, reaching about (87.5%) out of the sum total of the dist

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Writing of a Bragg Grating on a D-shaped Optical Fiber Using the KrF Excimer Laser
...Show More Authors

Fiber Bragg Grating has many advantages where it can be used as a temperature sensor, pressure sensor or even as a refractive index sensor. Designing each of this fiber Bragg grating sensors should include some requirements. Fiber Bragg grating refractive index sensor is a very important application. In order to increase the sensing ability of fiber Bragg gratings, many methods were followed. In our proposed work, the fiber Bragg grating was written in a D-shaped optical fiber by using a phase mask method with KrFexcimer. The resultant fiber Bragg grating has a high reflectivity 99.99% with a Bragg wavelength of 1551.2 nm as a best result obtained from a phase mask with a grating period of 1057 nm. In this work it was found that the rota

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
The 2nd Universitas Lampung International Conference On Science, Technology, And Environment (ulicoste) 2021
Study the effect of size variation and stability on the electronic and spectroscopic properties of BN wurtzoids- diamantane nanostructure via density functional theory
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref