The aim of this research is to construct an educational program in light of the theory of behavioral cognitive and its impact on the development of the efficient response to students affected by crises (centers of your right to education). To achieve the objectives of the research, two scales were developed by the researcher in addition to two equivalent hypotheses were formulated. The scale contains (26) items divided into five fields; for its validity and reliability were derived based on the measure of efficient response, an educational program based on the theory of behavioral cognition. The test and the educational program were applied to a sample of (60) students from the centers of your right to education, divided into experimental and control groups equally. Using statistical means, the results showed that. There was a statistically significant difference at the level of (0.05) between the control and experimental group in the post-test for the benefit of the experimental group in on the measure of efficient response, and between the pre-test and the post-test of the experimental group and for the benefit of the post-test. The research came out with a number of recommendations and suggestions.
With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreThis paper deals with the thirteenth order differential equations linear and nonlinear in boundary value problems by using the Modified Adomian Decomposition Method (MADM), the analytical results of the equations have been obtained in terms of convergent series with easily computable components. Two numerical examples results show that this method is a promising and powerful tool for solving this problems.
Importance of accounting standards belong to be the instructor and the advisor for accountant in performing his work . For each invironment a group of political, social, economical and cultural factors which distinguish it about other environments . In order to perform its aim in produsing accouting information helps in making decisions on different levels, accounting standards should established in a form that harmonized with the environment that apply in it . Establishing international accounting standards comes with the same direction and then it has put influential with standards some states that have influence on international accounting standards committee. So because of the big changes that happened in the inte
... Show MoreAchieving an accurate and optimal rate of penetration (ROP) is critical for a cost-effective and safe drilling operation. While different techniques have been used to achieve this goal, each approach has limitations, prompting researchers to seek solutions. This study’s objective is to conduct the strategy of combining the Bourgoyne and Young (BYM) ROP equations with Bagging Tree regression in a southern Iraqi field. Although BYM equations are commonly used and widespread to estimate drilling rates, they need more specific drilling parameters to capture different ROP complexities. The Bagging Tree algorithm, a random forest variant, addresses these limitations by blending domain kno
Tax fraud is following different methods of tax evasion (bypassing the laws, instructions and regulations related to tax) by not showing the real taxable income by using laws, instructions and regulations improperly, and because of the weak basic role of forensic accounting in detecting and reducing tax fraud, the problem has become more influential on the state general tax income. The main objective of the research is to identify forensic accounting and the extent to how it can be applied in the General Tax Authority to assist forensic authorities in issuing judgments in fraud cases. To achieve the objectives of the research, the descriptive analytical approach was used to reach the topic of the research, and a questionnaire (co
... Show MoreSerial tendering is better than other types of tendering when it comes to cost reduction, where civil infrastructure projects need a significant increase in the amount of tough planning, financial expenditures, engineering work, and resources of a different character than other types of construction projects. The effects of a lack of funding cause decrease in the completion speed of the project on time. The need to reduce the cost of bidding on recurrent civil infrastructure projects is critical. To achieve the desired goals of this research, this article will provide an overview of the type of bids used in the construction of schools implemented in the current financial perspective i
The survey and checklist of invasive species of the insects in some different localities of Iraq are revised; 24 invasive species were documented until December 2018 during the current investigations. The species distributions, common names and synonyms are given.
The current investigation included all of exotic species in Iraq, which are not collected during this study.
This research aims to solve the nonlinear model formulated in a system of differential equations with an initial value problem (IVP) represented in COVID-19 mathematical epidemiology model as an application using new approach: Approximate Shrunken are proposed to solve such model under investigation, which combines classic numerical method and numerical simulation techniques in an effective statistical form which is shrunken estimation formula. Two numerical simulation methods are used firstly to solve this model: Mean Monte Carlo Runge-Kutta and Mean Latin Hypercube Runge-Kutta Methods. Then two approximate simulation methods are proposed to solve the current study. The results of the proposed approximate shrunken methods and the numerical
... Show MoreKriging, a geostatistical technique, has been used for many years to evaluate groundwater quality. The best estimation data for unsampled points were determined by using this method depending on measured variables for an area. The groundwater contaminants assessment worldwide was found through many kriging methods. The present paper shows a review of the most known methods of kriging that were used in estimating and mapping the groundwater quality. Indicator kriging, simple kriging, cokriging, ordinary kriging, disjunctive kriging and lognormal kriging are the most used techniques. In addition, the concept of the disjunctive kriging method was explained in this work to be easily understood.