Preferred Language
Articles
/
jperc-1104
The Degree of Difficulties in Learning Mathematics for the Fifth and Sixth Grades from the Teachers' Point of View and Their Suggestions for Addressing Them
...Show More Authors

The current study aimed to identify the difficulties faced by the student in mathematics and possible proposals to address these difficulties. The study used a descriptive method also used the questionnaire to collect data and information were applied to a sample of (163) male and female teachers. The results of the study found that the degree of difficulties in learning mathematics for the fifth and sixth grades is high for some paragraphs and intermediate for other paragraphs, included the student's field. The results also revealed that there were no statistically significant differences at the level of significance (α = 0.05) between the responses of the members of the study sample from male and female teachers to the degree of difficulties in learning mathematics for the fifth and sixth grades in all paragraphs, except in a paragraph "Curricula contain unimportant subjects." which showed statistically significant differences at the significance level (α = 0.05) where differences were found for female teachers. Moreover, the results revealed that there were no statistically significant differences at the level of significance (α = 0.05) between the responses of the members of the study sample of teachers to the degree of difficulties in learning mathematics for the fifth and sixth grades in all paragraphs due to the variable of the grade (fifth-sixth). The study also revealed a list of possible suggestions to address the difficulties encounter a student in mathematics.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
Pre-Test Single and Double Stage Shrunken Estimators for the Mean of Normal Distribution with Known Variance
...Show More Authors

This paper is concerned with pre-test single and double stage shrunken estimators for the mean (?) of normal distribution when a prior estimate (?0) of the actule value (?) is available, using specifying shrinkage weight factors ?(?) as well as pre-test region (R). Expressions for the Bias [B(?)], mean squared error [MSE(?)], Efficiency [EFF(?)] and Expected sample size [E(n/?)] of proposed estimators are derived. Numerical results and conclusions are drawn about selection different constants included in these expressions. Comparisons between suggested estimators, with respect to classical estimators in the sense of Bias and Relative Efficiency, are given. Furthermore, comparisons with the earlier existing works are drawn.

View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (22)
Crossref (10)
Scopus Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Int. J. Nanoelectronics And Materials
Comparsion of the physical properties for CdS and CdS doped PVA thin films prepared by spray pyrolysis
...Show More Authors

Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison between Methods of Laplace Estimators and the Robust Huber for Estimate parameters logistic regression model
...Show More Authors

The logistic regression model regarded as the important regression Models ,where of the most interesting subjects in recent studies due to taking character more advanced in the process of statistical analysis .                                                

The ordinary estimating methods is failed in dealing with data that consist of the presence of outlier values and hence on the absence of such that have undesirable effect on the result.    &nbs

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Study the Relationship between Beta Decay Stability of Nuclide and its Shape for Some even-even Isobars
...Show More Authors

The aim of this work is to learn the relationship of the stability of (β) emitter isobars with their shape for some isobaric elements with even mass number (A=152 - 162). To reach this goal firstly the most stable isobar have been determined by plotting mass parabola (plotting the binding energy (B.E) as a function of the atomic number (Z)) for each isobaric family. Then three-dimensional representation graphics for each nucleus in these isobaric families have been plotted to illustrate the deformation in the shape of a nucleus. These three-dimensional representation graphics prepared by calculating the values of semi-axis minor (a), major (b) and (c) ellipsoid axis’s. Our results show that the shape of nuclides which is represented the

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Apr 20 2020
Journal Name
Neuroquantology
The Role of Water Absorption on Thermal Conductivity and Mechanical Properties for (Recycling HDPE-Coal Ash) Composite
...Show More Authors

View Publication
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Journal Of Ecological Engineering
Date Palm Fibre Waste Exploitation for the Adsorption of Congo Redis Dye via Batch and Continuous Modes
...Show More Authors

The present study utilised date palm fibre (DPF) waste residues to adsorb Congo red (CR) dye from aqueous solutions. The features of the adsorbent, such as its surface shape, pore size, and chemical properties, were assessed with X-ray diffraction (XRD), BET, Fourier-transform infrared (FTIR), X-ray fluorescence (XRF), and field emission scanning electron microscope (FESEM). The current study employed the batch system to investigate the ideal pH to adsorb the CR dye and found that acidic pH decolourised the dye best. Extending the dye-DPF waste mixing period at 25°C reportedly removed more dye. Consequently, the influence of the starting dye and DPF waste quantity on dye removal was explored in this study. At 5 g/L dye concentration, 48% d

... Show More
View Publication
Scopus (12)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Synthesis, Characterization and Biological Activity Evaluation of Some Pyrazoles, Thiazoles and Oxazoles Derived from 2-Mercaptoaniline
...Show More Authors

    Synthesis of 2-mercaptobenzothiazole (A1) is performed from the reaction of  o-aminothiophenol and carbon disulfide CS2 in ethanol under basic condition. Compound (A1)  is reacted with chloro acetyl chloride to give compound (A2). Hydrazide acid compound (A3) is obtained from the reaction of compound (A2) with  hydrazine hydrate in ethanol under reflux in the presence of glacial acetic acid .The reaction of hydrazide acid compound (A3) with ethyl acetoacetate gives pyrazole compound (A4). The new hydrazone  compound (A5) was prepared from the reaction of compound (A3) with  benzaldehyde. Reaction of compound

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Dec 20 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of the reserve requirement ratio in the activity of the bank credit: Applied Research in a sample of Iraqi private banks
...Show More Authors

The research topic (The Impact of the Compulsory Reserve on the Banks Credit-an applied  research on    a sample of Iraqi banks), was chosen on basis of the Iraqi  private Banks attempts to increase their credit activities in hope to gain more profits.This coincided with  the CBI aim to back the private banking market.It is thus apparent why the CBI issued its regulation to those banks to increase their capitals up  to IDB250. On the other hand,the CBI acted as an obstacle in the way of increasing the private banks of their capitals,that is by implementing the quantitive  monetary tool  so called the compulsory reserve.This is why we intended to overlook at this contradictional  problome

... Show More
View Publication Preview PDF