The purpose of this research is to identify the effect of the use of project-based learning in the development of intensive reading skills at middle school students. The experimental design was chosen from one group to suit the nature of the research and its objectives. The research group consisted of 35 students. For the purpose of the research, the following materials and tools were prepared: (List of intensive reading skills, intensive reading skills test, teacher's guide, student book). The results of the study showed that there were statistically significant differences at (0.05) in favor of the post-test performance of intensive reading skills. The statistical analysis also showed that the project-based learning approach has a high effect on the development of intensive reading skills among students in the research group. This was proved by calculating the effect size; using Eta squared (²η), where the effect size was equal to 0.94. In light of the findings of the research, he recommended a set of recommendations, including the need to review the objectives of teaching reading in the middle stage, so that these goals include intensive reading skills. As well as the need to train Arabic teachers in service on how to develop the skills of intensive reading through active learning methods, including the method of the project based on the effectiveness and activity of students.
The present study aimed to identify the therapeutic evaluation of chitosan extracted from the fungus cushroom and pure chitosan on glucose and lipid profile in the blood of 35 male rabbits with hyperlipidemia induced experimentally by cholesterol. The tests included estimation of glucose levels, total cholesterol, triglycerides, high-density lipoproteins, low-density lipoproteins, and very low-density lipoproteins. hyperlipidemia was induced in the male rabbits used in the study which was administered orally with cholesterol 150mg/kg body weight for a week. rabbits were divided into seven groups: control, cholesterol, pure chitosan, mushroom chitosan, cholesterol and pure chitosan, cholesterol and mushroom chitosan and cholestero
... Show MoreAutorías: Muayad Kadhim Raheem, Lina Fouad Jawad. Localización: Opción: Revista de Ciencias Humanas y Sociales. Nº. 21, 2019. Artículo de Revista en Dialnet.
Practical application is an effective tool for preparing qualified scientific and technical cadres if applied correctly and efficiently. In addition to being the complementary part of everything that has been studied in the years of study, it is a scientific linking tool between theory and application. Here lies the importance of this research in clarifying the central and important role that practical application plays in general in raising the scientific level of the student, and the extent of the suitability of the curriculum and means of practical application and the extent and needs of the students applying at the Institute of Administration - Rusafa - Department of Information Technology and Libraries. This research attempted to answe
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreThe corrosion inhibition of low carbon steel in1N HCl solution in the presence of peach juice at temperature (30,40,50,and 60)°C at concentration ( 5, 10, 20, 30, 40and 50 cm3/L)were studied using weight loss and polarization techniques. Results show that the inhibition efficiency was increased with the increase of inhibitor concentration and increased with the increase of temperature up to 50ºC ,above 50ºC (i.e. at 60 ºC) the values of efficiency decreases. Activation parameters of the corrosion process such as activation energies, Ea, activation enthalpies, ΔH, and activation entropies, ΔS, were calculated. The adsorption of inhibitor follows Langmuir isotherm. Maximum inhibition efficiency obtained was a bout 91% at 50ºC in the
... Show MoreThe dividends is one of difficult and important decisions taken by the administration in the economic units, because this decision has a direct impact on the investor and economic unit, so the main objective of any investor is achieve earnings, as well as information borne by dividends about the earnings quality of the economic unit and the level and efficiency of management to achieving earnings.
The research aims at explaining the effect of the dividends policy on the earnings quality in the companies listed in the Iraq Stock Exchange. The Miller model was used to measu
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More