Preferred Language
Articles
/
jcoeduw-908
The Impact of Polia Strategy in the Achievement and Retention of the Grammar of the Arabic Language
...Show More Authors

ABSTRACT
Threw this research to the following:
1 - Know the impact of strategy Puglia in the collection of the rules of the Arabic language
students at the Institute of preparation parameters .
2 - Know the impact of the retention strategy in Puglia collection rules Arabic language
students at the Institute of preparation parameters .
To verify the status Mmermaa Find researcher Elsafreeten following two hypotheses :
1 - There is no statistically significant difference between the average score for the collection
of the fourth grade students at the Institute for the preparation of material parameters who
were studying grammar strategy Puglia and average grades collectible fourth grade
students at the Institute of preparation parameters who are studying the same article the
usual way in the achievement test .
2 - There is no statistically significant difference between the average score for fourth-grade
students in the preparation of the Institute who are studying material parameters Grammar
strategy Puglia and the average scores in the fourth grade students of the Institute who set
up the parameters studying the same article the usual way to test retention .
Search by:
1 - Sets - a sample of fourth-grade students in the Department of Arabic Language Institute in
the preparation of the parameters in the province of Baghdad , Rusafa / 1
2 - Number of Topics Book Arabic grammar for students to be taught fourth grade Institutes
of preparation parameters for the academic year 2012-2013 .
3 - duration of the experiment one semester .
The sample of research ( 50) asking them to ( 25) students of the experimental group
and ( 25) a student of the control group of fourth grade students prepare parameters Institute
chose randomly .
Researcher chose a setting designs with partial test after me and the two experimental
and control groups ( experimental group used the strategy in Puglia solution grammatical
issues , and the control group , which used the method used ) .
Rewarded researcher between the two sets of research in the following variables :
chronological age / educational material in the former Arabic grammar / previous experience .
The researcher on the achievement test tool to search and extract properties
Alsekoumtria him, and used statistical methods to process the data statistically , namely:

- t- test for two independent samples (t-test).
2 - equivalent chi-square (X2).
3 - difficult equation paragraph .
4 - paragraph equation discrimination .
5 - effective alternatives erroneous equation ( Almmohat )
6 - Pearson correlation coefficient to calculate stability .
7 - Spearman Brown formula to correct the reliability coefficient .
Your search returned the following results : The results showed statistical degrees of
achievement test that the average scores of the experimental group is ( 72 ) and the average
score for the control group is ( 04,60 ) , as shown in the table (4) , and after testing the
significance of the difference between the averages using test samples t for samples
independent , results indicated the presence of statistically significant difference between the
average score for the collection of the two groups , for the benefit of the experimental group
as the value of T is calculated ( 184.2 ) is greater than the amount of tabular ( 2.01 ) , and it
rejects the null hypothesis and accept the alternative , which means that Puglia strategy have
an impact on achievement .
Taking the results showed statistical retention test scores that the average scores of the
experimental group is ( 36.70 ) and the average score for the control group is ( 72.61 ) , and as
shown in the table (12) , and after testing the significance of the difference between the
averages using t- test for two independent samples , it appeared that the difference was not
statistically significant , since the value of T is calculated ( 130.2 ) is greater than the amount
of tabular ( 01,2 ) , and therefore accept the alternative hypothesis , which means that the
strategy of Puglia her effectiveness in retaining the grammatical rule .
In light of the findings of the research can be concluded as follows:
1 . Puglia effective strategy to collect information grammatical fourth grade students at the
Institute of preparation parameters .
2 . Puglia effective strategy to retain information grammatical fourth grade students at the
Institute of preparation parameters.
In light of the findings and conclusions of the research researcher recommends the
following:
1 . Use problem-solving strategies in the teaching of grammatical issues as an important part
and the part of the essential aspects of teaching Arabic grammar when needed.
2 . Attention to students and activate their role in resolving the more grammatical issues and
limiting the role of the teacher on the supervision and guidance when necessary.
An update on the search researcher suggests the following:
1 . Conduct a similar study of the current study and observe the impact on student
achievement and retention textured literature .
2 . Conduct a similar study of the current study in other educational stages to get to know the
impact of the strategic Puglia in the collection and retention of other categories .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 11 2019
Journal Name
Iraqi Journal Of Physics
Proton momentum distributions and elastic electron scattering form factors for some Ge isotopes
...Show More Authors

The proton momentum distributions (PMD) and the elastic
electron scattering form factors F(q) of the ground state for some
even mass nuclei in the 2p-1f shell for 70Ge, 72Ge, 74Ge and 76Ge are
calculated by using the Coherent Density Fluctuation Model (CDFM)
and expressed in terms of the fluctuation function (weight function)
|F(x)|2. The fluctuation function has been related to the charge
density distribution (CDD) of the nuclei and determined from the
theory and experiment. The property of the long-tail behavior at high
momentum region of the proton momentum distribution has been
obtained by both the theoretical and experimental fluctuation
functions. The calculated form factors F (q) of all nuclei under s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Textural Properties Characterization for NaX and FeX Zeolites by Nitrogen Adsorption-desorption Technique
...Show More Authors

The zeolite's textural properties have a significant effect on zeolite's effectiveness in the different industrial processes. This research aimed to study the textual properties of the NaX and FeX zeolites using the nitrogen adsorption-desorption technique at a constant low temperature. According to the International Union of Pure and Applied Chemistry, the adsorption-desorption isotherm showed that the studied materials were mixed kinds I/II isotherms and H3 type hysteresis. The Brunauer-Emmett-Teller isotherm was the best model to describe the nitrogen adsorption-desorption better than the Langmuir and Freundlich isotherms. The obtained adsorption capacity and Brunauer-Emmett-Teller surface area values for NaX were greater than FeX. Ac

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue May 04 2021
Journal Name
International Journal Of Emerging Technologies In Learning (ijet)
Tactical thinking and its relationship with solving mathematical problems among mathematics department students
...Show More Authors

This research aims to know the essence of the correlative relationship between tactical thinking and solving mathematical problems. The researchers followed the descriptive research method to analyze relations, as all students from the mathematics department in the morning study were part of the research group. The research sample of (100) male and female students has been chosen based on the arbitrators' views. The tools for studying the sample of research composed of (12) items of the multiple-choice test in its final form to measure tactical thinking and require establish-ing a test of (6) test-type paragraphs to solve mathematical problems. The findings showed that sample students' tactical thinking and their capacity to overcome mathem

... Show More
View Publication
Scopus (50)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Thu Jan 30 2020
Journal Name
Neuroquantology
Electronic Transfers and (NLO) Properties Predicted by AB Initio Methods with Prove Experimentally
...Show More Authors

Hartree-Fock (HF) method relies in the calculations of nonlinear optical properties (NLO) for benzoic acid molecule. Also, another theoretical study is conducted by using the TD-DFT Density Functional Theory through B3LYP/High Base Set 6-311++G (2d,2p) on Gaussian program09. Moreover, an experimental study has been done to obtain the electrons spectrum for benzoic acid with and without ethanol. While the experimental study is done by using UV/VIS. spectrophotometer. Energy gap values of electronic transition between HOMO and LUMO is obtained from theoretical and experimental results. Consequently, the theoretical result for determining the energy gap calculated from EHOMO-LUMO wasvery close to the results of UV / VIS. spectrum. A theoretica

... Show More
View Publication
Scopus (29)
Crossref (21)
Scopus Crossref
Publication Date
Fri Aug 28 2020
Journal Name
Tropical Journal Of Natural Product Research
Red Cell Distribution Width and Neutrophil-Lymphocyte Ratio as Markers for Diabetic Nephropathy
...Show More Authors

Diabetic nephropathy (DN) is the foremost cause of end-stage renal disease. Early detection of DN can spare diabetic patients of severe complications. This study aimed to evaluate the diagnostic value of red cell distribution width (RDW) and neutrophil-lymphocyte ratio (NLR) in the detection of DN in patients with type 2 diabetes mellitus (T2DM). This cross-sectional study included a total of 130 patients with T2DM, already diagnosed with T2DM. The albumin creatinine ratio (ACR) in urine samples was calculated for each patient, according to which patients were divided into two groups: with evidence of DN when ACR ? 30 mg/g, and those with no evidence of DN when ACR < 30 mg/g. According to multivariate analysis, each of disease duration (OR

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jun 23 2015
Journal Name
Nature Communications
A metabolic stress-inducible miR-34a-HNF4α pathway regulates lipid and lipoprotein metabolism
...Show More Authors

View Publication
Scopus (223)
Crossref (222)
Scopus Clarivate Crossref
Publication Date
Wed May 26 2021
Journal Name
Energies
Rotational Piezoelectric Energy Harvesting: A Comprehensive Review on Excitation Elements, Designs, and Performances
...Show More Authors

Rotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect

... Show More
View Publication
Scopus (16)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (32)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref