Preferred Language
Articles
/
jcoeduw-817
A Unit Plan Based Upon The MI Theory: A theoretical study with an application Inside The Classroom
...Show More Authors

This research basically gives an introduction about the multiple intelligence
theory and its implication into the classroom. It presents a unit plan based upon the
MI theory followed by a report which explains the application of the plan by the
researcher on the first class student of computer department in college of sciences/
University of Al-Mustansiryia and the teacher's and the students' reaction to it.
The research starts with a short introduction about the MI theory is a great
theory that could help students to learn better in a relaxed learning situation. It is
presented by Howard Gardener first when he published his book "Frames of
Minds" in 1983 in which he describes how the brain has multiple intelligences not
only one general intelligence as it was believed before.He classifies these
intelligences into six or ten intelligences as will be explained later in this research.
The next section is a unit plan which is designed in accordance with the MI
theory for teaching the simple present and the present perfect tense for the first
class students in computer department of college of sciences. This plan consists of
four activities each involves more than three intelligences which suppose to help
most of the students in the class to learn better, each using their own intelligence in
learning. In all the activities, the students are supposed to work in groups.
Activity number one is teaching the simple present tense by writing a
description of pictures taken from the net using the simple present tense.
Activity number two is teaching the present perfect tense by using a game
called: "tell us what has happened". The teacher or groups of students do something
and then the teacher asks the other students to tell what has happened.
The third activity is teaching the simple present tense by using songs which
are taken from the net and designed for teaching purposes. These songs are
followed by a cloze sheet about the song to be filled by the students using the
simple present tense.
The fourth activity is teaching the present perfect tense using the
questionnaire. Students ask and answer using the present perfect tense as the
teacher gives each group a specific theme to talk about.
presents the teacher's reaction to using the MI theory in designing the unit
plan and teaching it to the students and the students' reaction to the unit plan with the type of assessments according to the MI theory which is followed by the researcher to assess the students.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Engineering
A High Resolution 3D Geomodel for Giant Carbonate Reservoir- A Field Case Study from an Iraqi Oil Field
...Show More Authors

Constructing a fine 3D geomodel for complex giant reservoir is a crucial task for hydrocarbon volume assessment and guiding for optimal development. The case under study is Mishrif reservoir of Halfaya oil field, which is an Iraqi giant carbonate reservoir. Mishrif mainly consists of limestone rocks which belong to Late Cenomanian age. The average gross thickness of formation is about 400m. In this paper, a high-resolution 3D geological model has been built using Petrel software that can be utilized as input for dynamic simulation. The model is constructed based on geological, geophysical, pertophysical and engineering data from about 60 available wells to characterize the structural, stratigraphic, and properties distri

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Engineering
A High Resolution 3D Geomodel for Giant Carbonate Reservoir- A Field Case Study from an Iraqi Oil Field
...Show More Authors

Constructing a fine 3D geomodel for complex giant reservoir is a crucial task for hydrocarbon volume assessment and guiding for optimal development. The case under study is Mishrif reservoir of Halfaya oil field, which is an Iraqi giant carbonate reservoir. Mishrif mainly consists of limestone rocks which belong to Late Cenomanian age. The average gross thickness of formation is about 400m. In this paper, a high-resolution 3D geological model has been built using Petrel software that can be utilized as input for dynamic simulation. The model is constructed based on geological, geophysical, pertophysical and engineering data from about 60 available wells to characterize the structural, stratigraphic, and properties distribution along

... Show More
Crossref (1)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
مجلة جامعة الانبار للعلوم البدنیة والریاضیة
The effect of the flipped classroom on cognitive achievement Some basic football skills for students
...Show More Authors

The aim of the research is to design a test with cognitive achievement through the use of the inverted class strategy for some basic soccer skills for gyms for first-average students, within the curriculum of the Ministry of Education, where the researcher used the experimental approach. For the same division (B) and the number of each group (10) students, i.e. the total total of the research sample (20) students, and the pre-test for the research sample was applied through the design of the test prepared by the research after which the educational program with the strategy was applied to the research sample and continued (8) weeks after Completion of the tutorial has been post-tested for the research sample, In it, he reached significant r

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
College Of Islamic Sciences
The Effectiveness of Combining the Meanings of Grammatical Tools in Understanding the Arabic Sentence A study of Some Linguistic Evidences
...Show More Authors

abstract

The grammatical tools (the letters of meanings) are of great importance in understanding the meanings of the Arabic sentences,

This research is a simple attempt to show how our venerable scholars employed the meanings of these tools when they interpreted the linguistic evidence, that is, the grammatical structure largely depends on the tool in forming the meaning within the sentences and employing the meanings of these grammatical tools in explaining the linguistic evidence by clarifying their significance in the contexts of their use and effectiveness. Synthesis of the meanings of grammatical tools is an important tool in understanding the linguistic structure in order to reveal its meaning.

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 01 2021
Journal Name
Al-khwarizmi Engineering Journal
Building a High Accuracy Transfer Learning-Based Quality Inspection System at Low Costs
...Show More Authors

      Products’ quality inspection is an important stage in every production route, in which the quality of the produced goods is estimated and compared with the desired specifications. With traditional inspection, the process rely on manual methods that generates various costs and large time consumption. On the contrary, today’s inspection systems that use modern techniques like computer vision, are more accurate and efficient. However, the amount of work needed to build a computer vision system based on classic techniques is relatively large, due to the issue of manually selecting and extracting features from digital images, which also produces labor costs for the system engineers.

  &nbsp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
A Software Defined Network of Video Surveillance System Based on Enhanced Routing Algorithms
...Show More Authors

Software Defined Network (SDN) is a new technology that separate the ‎control plane from the data plane. SDN provides a choice in automation and ‎programmability faster than traditional network. It supports the ‎Quality of Service (QoS) for video surveillance application. One of most ‎significant issues in video surveillance is how to find the best path for routing the packets ‎between the source (IP cameras) and destination (monitoring center). The ‎video surveillance system requires fast transmission and reliable delivery ‎and high QoS. To improve the QoS and to achieve the optimal path, the ‎SDN architecture is used in this paper. In addition, different routing algorithms are ‎used with different steps. First, we eva

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Security and confidentiality of information and its impact on the competitive performance of insurance companies: A prospective study for the Iraq insurance company and ALhamraa Insurance company (private)
...Show More Authors

The security of information represent the available  protection of  information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential  and controlling basis to protect individuals and companies from the damages. To insure the security  and confidentiality of information there are delicate,  proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Use Simulation To Differentiate Between Some Modern Methods To the Model GM(1,1) To Find Missing Values And Estimate Parameters With A Practical Application
...Show More Authors

Abstract

       The grey system model GM(1,1) is the model of the prediction of the time series and the basis of the grey theory. This research presents the methods for estimating parameters of the grey model GM(1,1) is the accumulative method (ACC), the exponential method (EXP), modified exponential method (Mod EXP) and the Particle Swarm Optimization method (PSO). These methods were compared based on the Mean square error (MSE) and the Mean Absolute percentage error (MAPE) as a basis comparator and the simulation method was adopted for the best of the four methods, The best method was obtained and then applied to real data. This data represents the consumption rate of two types of oils a he

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Evaluating the reality of applying the curriculum axis according to the Iraqi academic accreditation standards / a comparative study of a sample of governmental and private universities and colleges
...Show More Authors

The research aims to get acquainted with the evaluation of the reality of the application of the curriculum axis from among the eight Iraqi academic accreditation standards in a sample of governmental and private universities and colleges in Iraq and to identify the main and secondary reasons for it as well as to provide proposed mechanisms and procedures to help reduce gaps, If the research problem is represented in the weak availability of the requirements of the curriculum axis in universities and colleges (the study sample) due to the weak documentation and successful implementation of them and interest in them is still below the level of ambition, In order to arrive at scientific facts, the researchers adopted the comparativ

... Show More
View Publication Preview PDF
Crossref