The aim of the current research is to know the degree to which middle school teachers and female teachers in the southern border schools use electronic educational alternatives in the field of education from their point of view and its relationship to some variables, and to achieve this goal, a random sample of (200) teachers was selected in southern border schools, and a questionnaire was prepared to collect The data, as well as the descriptive approach was used to achieve this goal. T-test and analysis of variance were used for the statistical treatment. The results concluded that the educational courses provided to male and female teachers are not sufficient. It has also been concluded that the use of electronic educational alternatives in girls ’schools is higher than that of boy’s schools. It has also been concluded that professional development did not differ according to specialization, and it did not differ in different education offices.
Conclusion
After this tour with Alkhund Al-Khurasani and his book “Adequacy of Fundamentals,” we can highlight the results we have got through what we have reviewed in the research:
- Al-Akhund Al-Khurasani was born and raised in a scientific environment that gave him from his childhood the opportunity to gain knowledge of achievement. Therefore, he left to seek knowledge from the beginning of his youth and toured the cities, then he went to Tehran and then He went to the holy city of Najaf, then left for Samarra, then returned to Najaf in order to work on the scholars and the student.
- Al Akhund al-Khorasani studied on several scholars , whether in Iraq or in Geran, and he
God bestowed upon the Imams of the Ahl al-Bayt (peace be upon them) knowledge and wisdom, in addition to give them virtue as long as it was not given to anyone from the worlds. knowledge have been enriched from them that cause pride.
دور المعالجة الادراكية في اختزال البنية التصميمية للعلامة التجارية
The organization and development of the irrigation system and agrarian reform in Iraq had an impact on the diversity of its methods and uses
Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show MoreThis paper presents a robust control method for the trajectory control of the robotic manipulator. The standard Computed Torque Control (CTC) is an important method in the robotic control systems but its not robust to system uncertainty and external disturbance. The proposed method overcome the system uncertainty and external disturbance problems. In this paper, a robustification term has been added to the standard CTC. The stability of the proposed control method is approved by the Lyapunov stability theorem. The performance of the presented controller is tested by MATLAB-Simulink environment and is compared with different control methods to illustrate its robustness and performance.
استهدف البحث الحالي قياس الذاكرة العاملة لدى التالميذ ذوي صعوبات تعلم القراءة، وتحقيقا ألهداف البحث اعد الباحثان اختبار الذاكرة العاملة للتالميذ ذوي صعوبات القراءة باستعمال مهام بصرية - سمعية وتنفيذية على وفق إنموذج بادلي)Baddely)، ثم استخرج الخصائص السيكومترية لكل منهما المتمثلة بالصدق والثبات. وتحدد البحث الحالي بالتالميذ ذوي صعوبات تعلم القراءة في المدارس االبتدائية التابعة للمدير ية العامة لتربية بابل ف
... Show MoreNH3 gas sensor was fabricated based on deposited of Functionalized Multi-Walled Carbon Nanotubes (MWCNTs-OH) suspension on filter paper substrates using suspension filtration method. The structural, morphological and optical properties of the MWCNTs film were characterized by XRD, AFM and FTIR techniques. XRD measurement confirmed that the structure of MWCNTs is not affected by the preparation method. The AFM images reflected highly ordered network in the form of a mat. The functional groups and types of bonding have appeared in the FTIR spectra. The fingerprint (C-C stretch) of MWCNTs appears in 1365 cm-1, and the backbone of CNTs observed at 1645 cm-1. A homemade sensi
... Show MoreIn linear regression, an outlier is an observation with large residual. In other words, it is an observation whose dependent-variable value is unusual given its values on the predictor variables. An outlier observation may indicate a data entry error or other problem.
An observation with an extreme value on a predictor variable is a point with high leverage. Leverage is a measure of how far an independent variable deviates from its mean. These leverage points can have an effect on the estimate of regression coefficients.
Robust estimation for regression parameters deals with cases that have very high leverage, and cases that are outliers. Robust estimation is essentially a
... Show MoreOne of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,
... Show More