جاء التقويم ليكون مكملا للعمليات التعليمية يساعد على الوقوف على نتائجها وسبل النهوض بها والوقوف على المعوقات التي تقف امام مسيرتها وقد عنيت عمليات التقويم باهتمام كبير من قبل القائمين على العمليات التعليمية اذ عقدت العديد من المؤتمرات والندوات واجريت العديد من الدراسات عالميا ومحليا من اجل الوقوف على هذه العملية المهمة الداعمة للتعليم والنهوض بمستويات المتعلمين ، ومن بي
... Show Moreن الهدف من هذا البحث هو معرفة أثر إستراتيجية تعليمية في تحصيل مادة العلوم لدى طلاب الصف الاول المتوسط. ولتحقيق هدف البحث صاغ الباحثان الفرضية الآتية: لا توجد فروق ذو دلالة إحصائية عند مستوى (0,05) بين متوسط درجات طلاب المجموعة التجريبية الذين يدرسون مادة العلوم وفق إستراتيجية تعليمية وبين متوسط درجات طلاب المجموعة الضابطة الذين يدرسون المادة نفسها بالطريقة التقليدية في اختبار التحصيل. بلغت عينة البحث (59) طالبا
... Show MoreThe aim of the present research is to construct a model to evaluate the software engineering subject in the third grade department of Computing, in colleges of education. Then, evaluating the software Engineering subject from the view point of staff members by applying the constructed model, and in order to achieve the second aim of the present research the researcher has to find answers to the following questions:- 1. What is the presence of the proposed evaluating model fields, which was prepared by the researcher for the third grade Soft Ware Engineering subject from the view point of staff members? 2. What is the presence of the items for the proposed evaluating model, which was prepared by the researcher for the third grade Soft War
... Show MoreA finite element is a study that is capable of predicting crack initiation and simulating crack propagation of human bone. The material model is implemented in MATLAB finite element package, which allows extension to any geometry and any load configuration. The fracture mechanics parameters for transverse and longitudinal crack propagation in human bone are analyzed. A fracture toughness as well as stress and strain contour are generated and thoroughly evaluated. Discussion is given on how this knowledge needs to be extended to allow prediction of whole bone fracture from external loading to aid the design of protective systems.
The aim of this research is to use robust technique by trimming, as the analysis of maximum likelihood (ML) often fails in the case of outliers in the studied phenomenon. Where the (MLE) will lose its advantages because of the bad influence caused by the Outliers. In order to address this problem, new statistical methods have been developed so as not to be affected by the outliers. These methods have robustness or resistance. Therefore, maximum trimmed likelihood: (MTL) is a good alternative to achieve more results. Acceptability and analogies, but weights can be used to increase the efficiency of the resulting capacities and to increase the strength of the estimate using the maximum weighted trimmed likelihood (MWTL). In order to perform t
... Show Moreتناولنا في بحثنا أحد اساليب البرمجة الخطية وهي الطريقة المبسطة لتقدير معلمات انموذج الانحدار الخطي عن طريق اختيار دالة الهدف التي تعمل على تقليل الحد الادنى لمجموع الاخطاء الناتجة من تقدير المعلمات بطريقة المربعات الصغرى الاعتيادية ( OLS) حيث سيتم في الطريقة المبسطة ( simplex) فرض قيود على نفس الاخطاء نفسها بهدف تصغيرها الى اقل ما يمكن للحصول على تقديرات افضل لمعلمات انموذج الانحدار الخطي . على اساس ان طريقة المرب
... Show MoreIn this research, we dealt with the study of the Non-Homogeneous Poisson process, which is one of the most important statistical issues that have a role in scientific development as it is related to accidents that occur in reality, which are modeled according to Poisson’s operations, because the occurrence of this accident is related to time, whether with the change of time or its stability. In our research, this clarifies the Non-Homogeneous hemispheric process and the use of one of these models of processes, which is an exponentiated - Weibull model that contains three parameters (α, β, σ) as a function to estimate the time rate of occurrence of earthquakes in Erbil Governorate, as the governorate is adjacent to two countr
... Show MoreIn this paper, a new technique is offered for solving three types of linear integral equations of the 2nd kind including Volterra-Fredholm integral equations (LVFIE) (as a general case), Volterra integral equations (LVIE) and Fredholm integral equations (LFIE) (as special cases). The new technique depends on approximating the solution to a polynomial of degree and therefore reducing the problem to a linear programming problem(LPP), which will be solved to find the approximate solution of LVFIE. Moreover, quadrature methods including trapezoidal rule (TR), Simpson 1/3 rule (SR), Boole rule (BR), and Romberg integration formula (RI) are used to approximate the integrals that exist in LVFIE. Also, a comparison between those
... Show MoreLoanwords are the words transferred from one language to another, which become essential part of the borrowing language. The loanwords have come from the source language to the recipient language because of many reasons. Detecting these loanwords is complicated task due to that there are no standard specifications for transferring words between languages and hence low accuracy. This work tries to enhance this accuracy of detecting loanwords between Turkish and Arabic language as a case study. In this paper, the proposed system contributes to find all possible loanwords using any set of characters either alphabetically or randomly arranged. Then, it processes the distortion in the pronunciation, and solves the problem of the missing lette
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show More