Preferred Language
Articles
/
jperc-1181
The effectiveness of a teaching program based on the McCarthy Model (4MAT) in developing creative writing skills and reflective thinking among university students
...Show More Authors

The aim of this study was to determine the effect on using the McCarthy Model (4MAT) for developing creative writing skills and reflective thinking among undergraduate students. The quasi-experimental approach was adopted. And, in order to achieve the study objective, the educational content of Teaching Ethics (Approach 401), for the plan for the primary grades teacher preparation program  was dealt with by using a teaching program based on the McCarthy Model (4MAT) was used.

The study which was done had been based on the academic achievement test for creative writing skills, and the reflective thinking test. The validity and reliability of the study tools were also confirmed. The study was applied to a sample consisting of (66) students. 33 students were from the experimental group and 33 students were from the control group, and the academic achievement test for creative writing skills and a reflective thinking test were applied before and after the implementation of the study experiment, and the results of (ANCOVA) revealed the existence of statistically significant differences between the averages of sample groups Study in both tools; In favor of the experimental group, and the effect was large in each of the two tools, and in favor of the experimental group, the study recommended enriching academic programs in universities through modern teaching models and strategies to achieve Curricula learning outcomes in tandem with developing undergraduate students' skills. Several scientific researches have been proposed in the field of employing the McCarthy Model (4MAT) in developing various language.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 12 2024
Journal Name
مجلة حمورابي للدراسات
The strategic importance of the Strait of Malacca and its impact on the US-China rivalry
...Show More Authors

The Strait of Malacca is one of the waterways of strategic, political, and economic importance. This strait has an increasing importance to its neighboring countries. The Strait of Malacca is very important for China, especially in the field of energy supply security, as the vast ma jority of energy supplies come to China through this strait. China seeks to ensure its security, especially in light of the cooperation of countries that look forward to this strait as well as the United States, and what the United States may cause to China, as many of them are at war with China over the China Sea, not to mention the countries that overlook it. The importance of the research emerges from the basic idea that the strategic importance of the Strait

... Show More
View Publication
Publication Date
Wed Feb 25 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Computed tomographic measurement of maxillary sinus volume and dimension in correlation to the age and gender (comparative study among individuals with dentate and edentulous maxilla)
...Show More Authors

Background : Although development and progress in various diagnostic methods, but still identification of remnants of skeletal and decomposing parts of human is one of the most difficult skills in forensic medicine . Gender and age estimation is also considering an important problem in the identification of unknown skull. The aims of study: To estimate volume and dimension of maxillary sinus in individuals with dentate and edentulous maxillae using CT scan, and to correlate the maxillary sinus volume in relation to gender and age. Materials and Methods : This study included 120 patients ranged from (40-69 years), divided into two groups, dentate group with fully dentate maxilla and edentulous group with complete edentulous maxilla, and e

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 29 2024
Journal Name
Iraqi Journal Of Science
Biological versus Topological Domains in Improving the Reliability of Evolutionary-Based Protein Complex Detection Algorithms
...Show More Authors

     By definition, the detection of protein complexes that form protein-protein interaction networks (PPINs) is an NP-hard problem. Evolutionary algorithms (EAs), as global search methods, are proven in the literature to be more successful than greedy methods in detecting protein complexes. However, the design of most of these EA-based approaches relies on the topological information of the proteins in the PPIN. Biological information, as a key resource for molecular profiles, on the other hand, acquired a little interest in the design of the components in these EA-based methods. The main aim of this paper is to redesign two operators in the EA based on the functional domain rather than the graph topological domain. The perturb

... Show More
Scopus Crossref
Publication Date
Tue Sep 04 2018
Journal Name
Al-khwarizmi Engineering Journal
Study the Effect of Cutting Parameters on Temperature Distribution and Tool Life During Turning Stainless Steel 316L
...Show More Authors

This paper is focused on studying the effect of cutting parameters (spindle speed, feed and depth of cut) on the response (temperature and tool life) during turning process. The inserts used in this study are carbide inserts coated with TiAlN (Titanum, Aluminium and Nitride) for machining a shaft of stainless steel 316L. Finite difference method was used to find the temperature distribution. The experimental results were done using infrared camera while the simulation process was performed using Matlab software package. The results showed that the  maximum difference between the experimental and simulation results was equal to 19.3 , so, a good agreement between the experimental and simulation results  was achieved. Tool life w

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Social responsibility and its role in enhancing the quality of services: an analytical study of the views of a sample of employees in the Directorate of Electricity Distribution Nineveh / Center
...Show More Authors

The current research aims to diagnose the role of social responsibility as a contributing factor in enhancing the quality of services provided by the public sector in Iraq, where the research sought to demonstrate the relationship and impact of social responsibility dimensions (economic, legal, moral, and human) on the sector Services related to the electric field in Nineveh governorate because of its importance and its direct relationship with the citizen especially after the end of military operations in the destruction of the electricity sector by a large percentage in the city of Mosul. Nineveh Electricity Distribution Directorate / Center was chosen as a research community including (administrators and staff) of the research

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 31 2025
Journal Name
Joiv : International Journal On Informatics Visualization
RC5 Performance Enhancement Based on Parallel Computing
...Show More Authors

This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Aug 23 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Face mask detection based on algorithm YOLOv5s
...Show More Authors

Determining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on

... Show More
Publication Date
Thu Feb 28 2019
Journal Name
Multimedia Tools And Applications
Shot boundary detection based on orthogonal polynomial
...Show More Authors

View Publication
Scopus (41)
Crossref (35)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Engineering
Intelligent Dust Monitoring System Based on IoT
...Show More Authors

Dust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More