This research aims to:
1 – Make a proposed module for (aesthetics) for the second stage - Department of Art Education under education theories.
2 - Verification from the effect of the proposed module on student achievement and motivation towards learning aesthetics material.
To verification the second goal we wording these two hypotheses:
1- There are no individual differences with statistically significant at level (0.05) between the student's scores average. (Experimental group ) who studied according to the proposed module and the average student's scores (control group) who studied in the usual way for the achievement test for the Aesthetics material.
2- There are no individual differences with statistically significant at level (0.05) between the student's scores average. (Experimental group) who studied according to the proposed module and the average student's scores (control group) who studied in the usual way for the motivation measurement for the Aesthetics material.
This research is limited to the following determinants.
1 – The times temporal: first semester in the academic year 2011-2012
2 – The area temporal for second stage - Department of Art Education - college of Fine Arts in Baghdad
3-The objectivity temporal: The proposed module for Aesthetics according to under the education theories .
The second chapter includes two units, the first units (oriented cognitive science), and the second unit handled (relationship aesthetic experiences stereotypes units), and we can notes these two units in chapter two .
Third chapter show the search procedures of (module design, make the achievement test, and design experience of the unit).
The fourth chapter discussed the most important result after application module proposed (Experimental group.) according to plan teaching
And the researcher supported his opinion with the most important conclusions of the results, and the Researcher gives some recommendations in light of the results and the conclusions of research, at the end of the chapter researcher suggested some useful suggestion for Subsequent study.
Many consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is s
... Show MoreThis study aimed to provide a conceptual model for the use and benefits of the e-Government as related to administrative fraud and financial corruption. The study also looked into their concepts, forms, dimensions and types and the role of e-Government on fraud reduction, corruption in administration and finance and its impact on the government performance. From the result, it is revealed that there is need for electronic government for implementation in order to curb the rate of fraud and administrative and financial corruption and improve the quality of service provision for better performance
Introduction The pathophysiology of appendicitis likely stems from obstruction of the appendiceal orifice leading to an increase in intraluminal and intramural pressure, resulting in small vessel occlusion and lymphatic stasis. Organ supplied by an end artery, such as the appendix, are more prone to the deleterious effects of arterial occlusion. The continuous cigarette smoking might be associated with a greater risk for developing atherosclerosis.
Objectives The aim is to evaluate the effect of cigarette smoking on the incidence of complications of acute appendicitis.
Methods Patients suffered from symptoms and signs suggesting a
The study aimed to identify the importance of time in the Faculties of Physical Education and Sports Sciences atthe University of Baghdad, as well as to identify the relationship between time management and the level of staff functionalperformance. The research population consisted of the staff members who work in the Faculties of Physical Education andSports Sciences for Girls in Al-Jadriya for the academic year 2017-2018. A random sample of 50 staff members from eachfaculty were selected, that is the total number was (100) staff members. The researchers identified the concept of timemanagement and functional performance, after that a questionnaire consisting of (39) statements and (6) parts presented to aspecialized group of experts. The
... Show MoreThe study aimed to identify the importance of time in the Faculties of Physical Education and Sports Sciences at the University of Baghdad, as well as to identify the relationship between time management and the level of staff functional performance. The research population consisted of the staff members who work in the Faculties of Physical Education and Sports Sciences for Girls in Al-Jadriya for the academic year 2017-2018. A random sample of 50 staff members from each faculty were selected, that is the total number was (100) staff members. The researchers identified the concept of time management and functional performance, after that a questionnaire consisting of (39) statements and (6) parts presented to a specialized group of experts
... Show MoreThe internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show MoreThe depreciation of the Iraqi dinar against the US dollar, reaching low levels and causing disruptions in the local markets, has had detrimental effects on individuals and companies, particularly those with limited income and the poor. The local currency approached around 1600 dinars per dollar, after the official exchange rate had stabilized at around 1450 dinars per US dollar. This depreciation in the value of the Iraqi dinar can be attributed to financial speculation among currency traders, which directly affected exchange rates and illicit dollar smuggling operations. Bank transfers are also important alongside financial transactions, especially in light of current economic developments in the 21st century. To prevent currency s
... Show Moreهدف البحث التعرف الى اسباب سلوك التنمر لدى طلاب الصف الاول المتوسط من وجهة نظر المدرسين والمدرسات واساليب تعديله، واستعمل الباحثان المنهج الوصفي واختيار عينة عشوائية من المدرسين والمدرسات في متوسطة أرض الرافدين ومتوسطة الرحمن للبنين وكان عددهم (46) مدرساً ومدرسة بواقع (32) مدرساً و(14) مدرسة، واعتمد الباحثان الاستبانة أداة للتعرف الى اسباب سلوك التنمر واساليب تعديله، واشارت نتائج البحث الى تنوع اسباب التن
... Show More