Preferred Language
Articles
/
jperc-1206
The degree of using electronic educational alternatives in education from the teachers 'and female teachers' point of view Intermediate stage in southern border schools and its relationship to some variables
...Show More Authors

The aim of the current research is to know the degree to which middle school teachers and female teachers in the southern border schools use electronic educational alternatives in the field of education from their point of view and its relationship to some variables, and to achieve this goal, a random sample of (200) teachers was selected in southern border schools, and a questionnaire was prepared to collect The data, as well as the descriptive approach was used to achieve this goal. T-test and analysis of variance were used for the statistical treatment. The results concluded that the educational courses provided to male and female teachers are not sufficient. It has also been concluded that the use of electronic educational alternatives in girls ’schools is higher than that of boy’s schools. It has also been concluded that professional development did not differ according to specialization, and it did not differ in different education offices.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 06 2020
Journal Name
College Of Islamic Sciences
منهج الشيخ الخراساني (ت 1329هـ) في كتابه كفاية الأصول
...Show More Authors

Conclusion

After this tour with Alkhund Al-Khurasani and his book “Adequacy of Fundamentals,” we can highlight the results we have got through what we have reviewed in the research:

  • Al-Akhund Al-Khurasani was born and raised in a scientific environment that gave him from his childhood the opportunity to gain knowledge of achievement. Therefore, he left to seek knowledge from the beginning of his youth and toured the cities, then he went  to  Tehran and then  He went  to the holy city of Najaf, then left for Samarra, then returned to Najaf in order to work on the scholars and the student. 
  • Al Akhund al-Khorasani studied on several scholars , whether in Iraq or in Geran, and he

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 22 2022
Journal Name
Arab Science Heritage Journal
الإمام علي الهادي(ع) دراسة تحليلية في السيرة والمنهج
...Show More Authors

God bestowed upon the Imams of the Ahl al-Bayt (peace be upon them) knowledge and wisdom, in addition to give them virtue as long as it was not given to anyone from the worlds. knowledge have been enriched from them that cause pride.

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 03 2003
Journal Name
Al-academy
دور المعالجة الادراكية في اختزال البنية التصميمية للعلامة التجارية
...Show More Authors

دور المعالجة الادراكية في اختزال البنية التصميمية للعلامة التجارية

View Publication Preview PDF
Publication Date
Tue Mar 15 2022
Journal Name
Arab Science Heritage Journal
الري والإصلاح الزراعي في العراق (1-132هـ/ 622-750م)
...Show More Authors

The organization and development of the irrigation system and agrarian reform in Iraq had an impact on the diversity of its methods and uses

View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Wed Sep 29 2021
Journal Name
Al-khwarizmi Engineering Journal
Robust Computed Torque Control for Uncertain Robotic Manipulatorss
...Show More Authors

This paper presents a robust control method for the trajectory control of the robotic manipulator. The standard Computed Torque Control (CTC) is an important method in the robotic control systems but its not robust to system uncertainty and external disturbance. The proposed method overcome the system uncertainty and external disturbance problems. In this paper, a robustification term has been added to the standard CTC. The stability of the proposed control method is approved by the Lyapunov stability theorem.  The performance of the presented controller is tested by MATLAB-Simulink environment and is compared with different control methods to illustrate its robustness and performance.

View Publication Preview PDF
Scopus (11)
Crossref (6)
Scopus Crossref
Publication Date
Sun Dec 31 2023
Journal Name
مجلة التربية للعلوم الانسانية
الذاكرة العاملة لدى التلاميذ ذوي صعوبات تعلم القراءة
...Show More Authors

استهدف البحث الحالي قياس الذاكرة العاملة لدى التالميذ ذوي صعوبات تعلم القراءة، وتحقيقا ألهداف البحث اعد الباحثان اختبار الذاكرة العاملة للتالميذ ذوي صعوبات القراءة باستعمال مهام بصرية - سمعية وتنفيذية على وفق إنموذج بادلي)Baddely)، ثم استخرج الخصائص السيكومترية لكل منهما المتمثلة بالصدق والثبات. وتحدد البحث الحالي بالتالميذ ذوي صعوبات تعلم القراءة في المدارس االبتدائية التابعة للمدير ية العامة لتربية بابل ف

... Show More
Publication Date
Wed Feb 27 2019
Journal Name
Journal Of Nano Research
A Specific NH<sub>3</sub> Gas Sensor of a Thick MWCNTs-OH Network for Detection at Room Temperature
...Show More Authors

NH3 gas sensor was fabricated based on deposited of Functionalized Multi-Walled Carbon Nanotubes (MWCNTs-OH) suspension on filter paper substrates using suspension filtration method. The structural, morphological and optical properties of the MWCNTs film were characterized by XRD, AFM and FTIR techniques. XRD measurement confirmed that the structure of MWCNTs is not affected by the preparation method. The AFM images reflected highly ordered network in the form of a mat. The functional groups and types of bonding have appeared in the FTIR spectra. The fingerprint (C-C stretch) of MWCNTs appears in 1365 cm-1, and the backbone of CNTs observed at 1645 cm-1. A homemade sensi

... Show More
View Publication
Scopus (19)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
دراسة مقارنة بين بعض الطرائق الحصينة في تقدير معلمات انموذج الانحدار الخطي باستخدام اسلوب المحاكاة التجريبي في حالة وجود بيانات تتضمن مشاهدات شاذة
...Show More Authors

In linear regression, an outlier is an observation with large residual.  In other words, it is an observation whose dependent-variable value is unusual given its values on the predictor variables. An outlier observation may indicate a data entry error or other problem.

An observation with an extreme value on a predictor variable is a point with high leverage. Leverage is a measure of how far an independent variable deviates from its mean. These leverage points can have an effect on the estimate of regression coefficients.

Robust estimation for regression parameters deals with cases that have very high leverage, and cases that are outliers. Robust estimation is essentially a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
CVOTING: An Anonymous Ballot E-Voting System
...Show More Authors

One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref