Preferred Language
Articles
/
jperc-1028
The Effect of using Project - Based Learning method in development intensive reading skills at middle school students
...Show More Authors

The purpose of this research is to identify the effect of the use of project-based learning in the development of intensive reading skills at middle school students. The experimental design was chosen from one group to suit the nature of the research and its objectives. The research group consisted of 35 students. For the purpose of the research, the following materials and tools were prepared: (List of intensive reading skills, intensive reading skills test, teacher's guide, student book). The results of the study showed that there were statistically significant differences at (0.05) in favor of the post-test performance of intensive reading skills. The statistical analysis also showed that the project-based learning approach has a high effect on the development of intensive reading skills among students in the research group. This was proved by calculating the effect size; using Eta squared (²η), where the effect size was equal to 0.94. In light of the findings of the research, he recommended a set of recommendations, including the need to review the objectives of teaching reading in the middle stage, so that these goals include intensive reading skills. As well as the need to train Arabic teachers in service on how to develop the skills of intensive reading through active learning methods, including the method of the project based on the effectiveness and activity of students.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The Relationship between Fiscal Policy and Human Development Analytical Studay Of Iraq Using The (ARDL)Model
...Show More Authors

Fiscal policy is one of the important economic tools that affect economic development in general and human development in particular through its tools (public revenues, public expenditures, and the general budget).

It was hoped that the effects of fiscal policy during the study period (2004-2007) will positively reflect on human development indicators (health, education, income) by raising these indicators on the ground. After 2003, public revenues in Iraq increased due to increased revenues. However, despite this increase in public budgets, the actual impact on human development and its indicators was not equivalent to this increase in financial revenues. QR The value of the general budget allocations ha

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Engineering
Dust Effect on the Efficiency of Silicon Mono Crystalline Solar Modules at Different Tilt Angles at Al-Jadryia Climate Conditions
...Show More Authors

Solar energy usage in Iraq is facing many issues; one of those is the accumulation “of the dust on the surface of the solar module which” would highly lower its efficiency. The present work study the effect of dust accumulation” on installing fixed solar modules with different inclined angles 15o, 33o, 45o, 60o. Evaluation of the solar modules performance under different circumstance conditions such as rain, wind and humidity are considered in study of dust effect on solar module performance. The results show that the lowest output average efficiencies of solar modules occurs at 15o horizontally inclined angle are 7.4% , 6.7% , 8.0% , 8.1%, and 8.4% for the cor

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 15 2023
Journal Name
International Journal Of Emerging Technologies In Learning (ijet)
Instructional Design According to the Repulsive Learning Model and its Impact on the Achievement of Chemistry and Lateral Thinking for Third-Grade Intermediate Students
...Show More Authors

Identify the effect of an educational design according to the repulsive (allosteric) learning model on the achievement of chemistry and lateral thinking. The sample consisted of (59) students from third-grade intermediate students. They were randomly distributed into two groups (experimental and control), and the equivalence was done in (chronological age, previous achievement in chemistry, intelligence, lateral thinking). The (30) students from experimental group were taught according to the instructional design, other 29 students from the (control) group were taught according to the usual method. Two tests done, one of them is an achievement test consisted of (30) items of the type of multiple choice, the other was a lateral think

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jul 01 1996
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
SOME ACARINE ECTOPARASITES ON BATS IN MIDDLE IRAQ
...Show More Authors

A total of 61 bat specimens belonging to three species were collected from four distinct sites in the middle of Iraq. Five species of acarine ectoparasites on bats were found. These were: Steatonyssus periblepharus Kolenati, Spinturnix acuminatus (C. L. K.). Cheletonella sp. Rhizoglyphus sp., and Argas sp. Three of the recorded species were new to Iraqi fauna. The abundance and accurence of each parasite was varied from one species to another. S. periblepharus aria S. acuminatus were the most common species found in this study.

View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of Education Program on Secondary School Teachers Psycho-Social Changes with Menopause in Baghdad City
...Show More Authors

Objective: To assess the effect of education program on psychological and social changes of secondary school teachers with menopause.

Method: A quasi-experimental design is carried out with the application of a pre- post –test for menopause secondary school teacher's bio-psychosocial changes. Non-probability sample consists of (60 female teachers) (40) teachers from Al- Rusafa first Education Directorate secondary schools, and (20) teachers from Al- Karkh third Education Directorate secondary schools. The sample was exposed to pretest, educational program, and posttest. Data were collected through the utilization of the study instrument (the questionnaire) and application of bio-psychosocial ed

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A missing data imputation method based on salp swarm algorithm for diabetes disease
...Show More Authors

Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B

... Show More
View Publication
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors