The present study aims at identifying the effect of Renzulli model on achievement and holistic thinking among the fifth grade students in the Holy Quran and Islamic Education. The experimental method with partial control was used, and the sample was chosen randomly. The sample consisted of (62) students distributed into experimental and control groups. 164 behavioral goals were formulated based on Bloom's first three levels taxonomy (knowledge and comprehension, application, analysis and installation, and evaluation). The researchers designed a post-test to measure the achievement of students in the subject of Holy Quran and Islamic Education which consisted of (40) objective items and a measure of holistic thinking which consisted of (30) items. The validity and reliability of the items have been calculated. The research found the following results: 1. There is a statistically significant difference at the level of significance (0.05) between the mean scores of the experimental group who studied via the Renzulli model and the average scores of the control group students who studied via the traditional method in the post-achievement test in favor of the experimental group. 2. There is a statistically significant difference at the level of significance (0.05) between the average scores of the experimental group students who studied via the Renzulli model and the average scores of students of the control group who studied via the traditional method in the scale of holistic thinking in favor of the experimental group.
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreBackground: Pain, swelling and trismus are the main minor complications encountered after surgical extraction of impacted third molars, minimizing these postoperative complications is the center of many studies, one proposed method is the prophylactic administration of corticosteroids, the aim of this study is to evaluate the effect of prophylactic Dexamethasone administration on facial swelling and trismus after surgical extraction of impacted third molars. Materials and methods: 20 patients were included in this study, they were randomly divided into 2 groups of 10 patients each; a study group in which patients were given 8 mg. Dexamethasone 1 hour before surgical extraction of impacted third molar and 4 mg. 6 hours postoperatively, and a
... Show MoreAbstract
Praise be to Allah and prayers and peace be upon our Prophet, Muhammad, his family and all of his companions,
This research addresses the issue of judge's preaching to the litigants and witnesses; it is a very significant issue since the judge cannot know the insides and facts, but it issues judgments based on the hearings. Since people are originally wrong-doing and ignorant, they, therefore, commit injustice, oppression, false adversarial, and false testimony. However, some people can possibly retreat and return to the right, after being inattentive or recalcitrant, by preaching. This fact led scholars to talk about the judge's preaching to litigant and witnesses and this research is conducted
... Show MoreThe aim of this research was to analyze the financial reporting requirements of segmental information that stipulated by the Iraqi accounting rules, investigating the extent of it compliance with the requirements of the International Financial Reporting Standard No.8 (IFRS 8) and the Statement of Financial Standards No.131 (SFAS 131). Also the research aimed to identify the segmental disclosure practices in listed corporations on Iraq Stock Exchange (ISX), basing on a hypotheses said that “the insufficient of Iraqi financial reporting requirements of segmental information affect<
... Show MoreWe use of multi-choice Goal Programming (MCGP), which is a developed model of Goal Programming where it is used in circumstances of the multiplicity and difference of goals when choosing between decision alternatives in cases of allocating resources, as it is a model that seeks to find the closest and best solutions to the specific values of the goals within the aspiration levels, as the first goal in the multi-choice goal programming model that is used to reduce the total cost of storage and shortage, while the other goal was to reduce the difference between the real demand that the hospitals need from the blood transfusion center and the units that already achieved. The case Iraqi Center
... Show MoreThis study includes isolation, purification, and identification of Fusarium oxysporum from chili pepper infected plants. Eucalyptus camaldulensis were collected and air dried at room temperature, then ground to semi powdered state. Phenols, alkaloids and terpens were extracted from Eucalyptus camaldulensis. The antifungal activity, type of extracts was evaluated at different concentrations 5 and 10 mg / ml of these compounds were prepared and their antagonistic activity was studied. The Percentage of radial growth inhibition of fungi by plant extracts was measured after 7 day incubation. Results showed that terpens extract was the most active against fungi and alkaloids extract had less antifungal activity and the percentage of mycelia r
... Show MoreThe study includes building a 3-D geological model, which involves get the Petrophysical properties as (porosity, permeability and water saturation). Effective Porosity, water saturation results from log interpretation process and permeability from special correlation using core data and log data. Clay volume can be calculated by six ways using IP software v3.5 the best way was by using gamma Ray. Also, Water Resistivity, flushed zone saturation and bulk volume analysis determined through geological study. Lithology determined in several ways using M-N matrix Identification, Density-Neutron and Sonic-Neutron cross plots. The cut off values are determined by Using EHC (Equivalent Hydra
Theoretical trends have appeared Which posed the concept of biological structures in contemporary architecture concept, Spread through the emergence of architectural production that reflect and indicate the nature of the construction structures based on the ideas and principles of biological structures in biological science: Despite the emergence of many architectural proposals that tried to explain the concept in the field of architecture, but it is not dealt with in depth and not given a comprehensive definition: So there was need to search for the concept and its beginning in the biological field as a general framework down to the field of architecture for the purpose of reducing the limits of their search framework T
... Show More