Preferred Language
Articles
/
jcofarts-1238
Digital employment of education data in children's television programmes
...Show More Authors

The communication inspiration formed an essential foundations for contribute the influence individuals and recipients, whether negatively or positively, through the messages that were published and presented in them with multiple themes and viewpoints that covered all parts of the world and all age groups; it is directed to children addressing the various stages of childhood, as it simulates many goals, including what is directed through the digital use of educational data in television production, as it is considered an intellectual and mental bag to deliver ideas and expressive and aesthetic connotations to children, where the songs and cartoons carrying data on education; within adjacent relations and in a mutual direction, both of them support each other to achieve meaning and awareness. So that, the foregoing, the researcher has taken to delving into the folds of this title and its axes in a group of horizons and depth in its contents in terms of content and form; also, the exposure to the system of educational values in education and the age groups of children, as well as a review of the digital use of educational data in children's television programs and the method of technical treatment of them; the research aims to study the subject in its aspects, and from this point of view, the researcher formulated the research problem to launch his study with the following question; what are the technical and digital uses and treatments of education data in television production, and since it aims to reveal the employment of digital employment of educational data in children’s television programmes, the approach was adopted for descriptive (content analysis) being more appropriate to achieve the goals and reach the desired results, among which lies the plurality of contents and educational values in the children’s television program from the production of data that contribute to the establishment of education through digital software to produce an expressive, semantic and aesthetic level.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 28 2022
Journal Name
Al–bahith Al–a'alami
Content of Data Journalism in Security Topics - Security Media Cell Model Research extracted from a master’s thesis
...Show More Authors

This paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in differ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 01 2010
Journal Name
Journal Of Educational And Psychological Researches
اثر التعلم التعاوني (جيكسو ) في دافعية طالبات قسم رياض الأطفال لتعلم مادة بايكولوجية الإنسان
...Show More Authors

The current study aims at investigating the effect of cooperative learning (Jigsaw) on motivation of female students. Department of kindergarten to learn Human biology. This is of be dove through verification of the hypothesis that there is no significant difference at the 0.05 level between the motivation of experiment of group subjects who study according to (Jigsaw) cooperative learning and that of the control group subjects who study traditionally.
The study is limited to female students al the first year-Department of kindergarten college of Education for women university of Baghdad during the academic year 2007-2008.
An experiment of design of partial control and post-test for two groups is used. The experiment groups consist

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
The Degree of Using Computers in Administrative Jobs and the Obstacles of Usage in Public Education Schools in Sharoorah Governorate: Saudi Arabia
...Show More Authors

This study aimed to identify the degree of use computers in administrative functions (planning, organization, controlling, and evaluation) among school leaders and assistants in public education schools in Sharoorah governorate ، as well as to identify obstacles of  use computers in administrative functions from the perspective of school leaders and assistants male and female in public schools during the academic year 1439-1440, the study sample  (66) school leaders and assistants, males (58), a and females (44), , and to answer the questions of the study, the researchers developed a questionnaire consisting of  (60) items, has been verified sincerity and persistence, and data analysis was used frequencies, percentages an

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
: financial fraud ,Audit risks ,inherent risk ,Detection risk, Data Mining .
...Show More Authors

Abstract

The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 27 2021
Journal Name
Iraqi National Journal Of Nursing Specialties
Parents' Attitudes toward Immunization and its Relation with Pediatric Immunization Compliance at Primary Health Care Centers in Karbala City, Iraq
...Show More Authors

Objective(s): To assess parents' attitude toward immunization and its relation with their compliance and to find out the relationship between parents' attitude and their socio-demographic characteristics.
Methodology: A descriptive design is conducted from the period of 19th September 2020 to the 6th of March 2021. A non-probability (convenient) sample of (292) parents was selected from (5) primary health care centers in Karbala city. These centers are distributed throughout (2) primary health care sectors selected randomly as (20%) from each sectors. The questionnaire is developed and composed of three parts: First part: parent's socio-demographic characteristics, Second part: parents' attitude domain, which involves (13 items), and

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 01 2010
Journal Name
International Journal Of Advancements In Computing Technology
Implementation of digital chaotic signal generator based on reconfigurable LFSRs for multiple access communications
...Show More Authors

This paper describes the digital chaotic signal with ship map design. The robust digital implementation eliminates the variation tolerance and electronics noise problems common in analog chaotic circuits. Generation of good non-repeatable and nonpredictable random sequences is of increasing importance in security applications. The use of 1-D chaotic signal to mask useful information and to mask it unrecognizable by the receiver is a field of research in full expansion. The piece-wise 1-D map such as ship map is used for this paper. The main advantages of chaos are the increased security of the transmission and ease of generation of a great number of distinct sequences. As consequence, the number of users in the systems can be increased. Rec

... Show More
Scopus (3)
Scopus
Publication Date
Sun Jul 06 2014
Journal Name
Journal Of Educational And Psychological Researches
أصول التربية : تضارب المحتوى وإشكالية الإعداد دراسة نقدية لكتب ومقررات أصول التربية في الجامعات العربية ووضع تصور منهاجي بديل
...Show More Authors

Research questions  start from the fact that what the Arab origins of education  indicted . First question are :

- To what extent the subject of assets acquired a specific meaning in the Arabic books and educational subjects ? Is these selections are reflected on the classification of assets and their types ?
- What’s the nature of the content ? .Is there a consistency between the meaning and content ?

- What entrances handling and curriculum approach and tactics are in those books ?

- Is the assets subject introduced within  the grade  best suited ?

         &nb

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 24 2019
Journal Name
Iraqi Journal Of Physics
High spatial resolution digital elevation model (DEM) production using different interpolations techniques
...Show More Authors

DEMs, thus, simply regular grids of elevation measurements over the land surface.The aim of the present work is to produce high resolution DEM for certain investigated region (i.e. Baghdad University Campus\ college of science). The easting and northing of 90 locations, including the ground-base and buildings of the studied area, have been obtained by field survey using global positioning system (GPS). The image of the investigated area has been extracted from Quick-Bird satellite sensor (with spatial resolution of 0.6 m). It has been geo-referenced and rectified  using 1st order polynomial transformation. many interpolation methods have been used to estimate the elevation such as ordinary Kriging, inverse distance weight

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
مجلة دراسات محاسبية ومالية
تكنولوجيا التحول الرقمي في الخدمة التأمينية في شركة التامين الوطنية وشركة التأمين العراقية العامة / بحث تطبيقي
...Show More Authors

هدف هذا البحث الى التعرف على أثر فاعلية تكنولوجيا التحول الرقمي في تحسين كفاءة الخدمة التأمينية في شركات التأمين العامة في العراق من خالل تكنولوجيا التحول الرقمي في العملية التأمينية "الترويج لمنتج التأمين,تقديم طلب التأمين,االكتتاب ,تسوية الخسائر" ولتحقيق هذا الهدف تم تصميم استمارة استقصاء وزعت في المجتمع المبحوث والتي تمثل متخذي القرار في الشركات المبحوثة قيد البحث وكان من اهم نتائج البحث وجود عالقة بين ا

... Show More