Preferred Language
Articles
/
jih-753
Developing a Real Time Method for the Arabic Heterogonous DBMS Transformation
...Show More Authors

   A common problem facing many Application models is to extract and combine information from multiple, heterogeneous sources and to derive information of a new quality or abstraction level. New approaches for managing consistency, uncertainty or quality of Arabic data and enabling e-client analysis of distributed, heterogeneous sources are still required. This paper presents a new method by combining two algorithms (the partitioning and Grouping) that will be used to transform information in a real time heterogeneous Arabic database environment

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 14 2023
Journal Name
Res Militaris
The Familiarity of Preparatory Stage Arabic Language Teachers of Higher-Order Thinking Skills
...Show More Authors

The study aimed to find out the degree of practicing Arabic language teachers in the preparatory stage of higher-order thinking skills from their point of view in the first, second and third Baghdad Rusafa directorates of education. The descriptive survey method was used. The study population consisted of teachers of the Arabic language in the directorates of Baghdad, Rusafa, First, Second and Third, and the sample number was (284) teachers. A questionnaire was built on higher-order thinking skills. The validity and reliability of the tool were verified, after which the scale was applied to the research sample of (116) schools and (168) teachers who were randomly selected from the schools affiliated to the Baghdad Education Directorates Rus

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
Employment of Folk Games and Tales in Developing the Skills of Spontaneous Acting in Kindergartens
...Show More Authors

Some may think that the games, especially the folk games, are just a means of entertainment and fun and children may resort to them to alleviate the tension they are experiencing at home or school, but the truth is that they carry values and meanings that can be invested in education because they contribute to the development of the personality of the child and enhance self- confidence. The objective of the research is to learn how to use folk games to develop children's acting and   performance skills in the   kindergartens.

The research included a theoretical introduction of three sections: the first section: education through play. The second section: the folk tale and the development of imagination and the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Ibero- American Journal Of Exercise And Sports Psychology
THE EFFECT OF SPECIAL EXERCISES USING TWO DESIGNED DEVICES IN DEVELOPING SOME DEFENSIVE HANDBALL SKILLS
...Show More Authors

Scopus (3)
Scopus
Publication Date
Sat Dec 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Experimental Work to Study the Behavior of Proppant Inside the Hydraulic Fractures and the Plugging Time
...Show More Authors

Experiments were conducted to study the behavior of the solid particles (proppant) inside the hydraulic fracture during the formation stimulation, and study the effect of the proppant concentration on the hydraulic fracturing process, which lead to bridge and screen-out conditions inside the fractures across the fracture width that restricts fracturing fluid to flow into the hydraulic fracture. The research also studies the effect of the ratio between the fracture size and the average particles diameter “proppant", on fracture bridging. In this study two ratios were considered β= 2 and 3 ,where β=Dt / Dp where: Dt= hydraulic fracture size (width) and Dp=Average particles diameter.

This work pr

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Numerical Solution for Classical Optimal Control Problem Governing by Hyperbolic Partial Differential Equation via Galerkin Finite Element-Implicit method with Gradient Projection Method
...Show More Authors

     This paper deals with the numerical solution of the discrete classical optimal control problem (DCOCP) governing by linear hyperbolic boundary value problem (LHBVP). The method which is used here consists of: the GFEIM " the Galerkin finite element method in space variable with the implicit finite difference method in time variable" to find the solution of the discrete state equation (DSE) and the solution of its corresponding discrete adjoint equation, where a discrete classical control (DCC) is given.  The gradient projection method with either the Armijo method (GPARM) or with the optimal method (GPOSM) is used to solve the minimization problem which is obtained from the necessary conditi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
College Of Islamic Sciences
The grammatical approach to explain Bant Souad's poem (Explanation of Ibn Hisham as a model) a . M . Dr. Abdul Hamid Hamad shehatha Mustansiriya University Faculty of Basic Education the department of Arabic language
...Show More Authors

 

This study is concerned with shedding light on the grammatical method of Ibn Hisham Al-Ansari (761 AH), in his explanation of Bant Souad’s poem by the poet Kaab bin Zuhair, and I included a brief description of Ibn Hisham’s life with a number of explanations of this poem, then clarified the most important features of this method The grammar represented by his reliance on hearing and presenting it to analogy with mention of types of analogy, as well as his attribution of opinions to their owners with weighting, selection and balancing, and his attention to reasoning and a number of grammatical ailments, and his approach is also distinguished by following the method of fractal.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 20 2019
Journal Name
Political Sciences Journal
The authority of the president in the successive regimes in Iraq in the time - span 1920-2003
...Show More Authors

Abstract The success of the system of government in any country needs to have a handle on the amount of power efficiency , capacity , capability and wisdom, Iraq has gone through since its inception through several stages of time, namely: The first stage: which ran from August 23, 1921 until July 14, 1958 and was ruling monarchy (rule of the royal family) and punishing power of political elites both of them and works access to power without taking into consideration the laws and principles of the Constitution, and as a result of the inability of civilian powers and political parties access to power to grant that army officers regulatory and disciplinary specifications as well as possessing arms and overthrow the rule of the minority coup

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 02 2017
Journal Name
Journal Of Educational And Psychological Researches
The Effect of Lead Time Strategy on the First Intermediate Class Pupils' Achievement in Geography
...Show More Authors

The study aims at finding out the effect of the lead time strategy on the first intermediate class pupils' achievement in geography The partial experimental design of two groups, experimental and control, with pre-post tests is used. The sample is represented in (73) female pupils. The sample is divided into two groups (37) experimental group and (36) control one. The sam ple is selected from first intermediate class pupils ( Al Batol intermediate school for girls) Baghdad Al-karkh-3, for academic year 2015-2016 The researcher has equalized the two groups in several variables: the previous achievement tests, intelligence, age in months, the scores of geography test of first course

View Publication Preview PDF