Preferred Language
Articles
/
jperc-1209
درجة استخدام معلمات الرياضيات لأدوات التقويم البديل من وجهة نظرهن
...Show More Authors

هدفت هذه الدراسة إلى التعرف على درجة استخدام معلمات الرياضيات لأدوات التقويم البديل من وجهة نظرهن، وتحديد إذا كانت توجد فروق ذات دلالة إحصائية تعزى لمتغير سنوات الخبرة التدريسية، ولتحقيق أهداف الدراسة تم استخدام المنهج الوصفي. وتكونت عينة الدراسة من 37 معلمة من معلمات الرياضيات في الحلقة الثانية من التعليم الأساسي في محافظة ظفار في سلطنة عُمان. وتم بناء استبانة مكونة من (21) فقرة موزعة على (4) محاور تمثل أدوات التقويم البديل وهي: قواعد تقدير الأداء (7) فقرات، ملفات الإنجاز (6) فقرات، الاختبارات الكتابية (4) فقرات، خرائط المفاهيم (4) فقرات وفقاً لمقياس ليكرت الخماسي. وأظهرت نتائج الدراسة أن المعلمات بشكل عام يستخدمن أدوات التقويم البديل بدرجة مرتفعة، وجاء استخدام أداة قواعد تقدير الأداء بالمرتبة الأولى، يليها أداة ملفات الإنجاز ثم الاختبارات الكتابية، بينما خرائط المفاهيم احتلت المرتبة الأخيرة، كما أشارت النتائج إلى أنه توجد فروق ذات دلالة إحصائية في درجة استخدام المعلمات لأدوات التقويم البديل تعزى لمتغير سنوات الخبرة التدريسية لصالح الفئة الأكبر (سنوات خبرة أكثر من 16سنة)، وأوصت الدراسة أن تولي معلمات الرياضيات المزيد من الاهتمام حول استخدام أدوات التقويم البديل والتركيز بشكل أكبر على التقنيات الخاصة بها، وإجراء المزيد من الدراسات ذات العلاقة بالتقويم البديل.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The Position of the United States from Britain in the discussions of British Evacuation from Egypt (1946-1952)
...Show More Authors

Many reasons combined behind the Standing of U.S. against Britain in its aggression against Egypt in 1956; the consensus of world opinion on the need to stop the aggression and the fear of the Soviet military intervention which mean a new world war.
United States desired to weaken British influences in the region in general to get new oil gains in the Arabian Gulf and Egypt at the expense of Britain. The exiting of Britain from the area served U.S. strategic interests in the Middle East in general and Egypt in particular to keep the flow of oil for U.S advantage.
The United States wanted to keep its image in the region to apply its future political projects including Eisenhower Project, which intended to take the position of Britis

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 13 2025
Journal Name
Al–bahith Al–a'alami
THE ROLE OF WESTERN LEGISLATIONS AND LAWS IN PROTECTING CHILDREN FROM ADVERTISEMENT
...Show More Authors

This study aims to identify the most important legislatures and legal frameworks pertaining to advertisement for children. It focuses on the western approach, which is characterized by the variety of its perspectives in presenting issues and in identifying problems. However, if studies show that there is a certain awareness about the advertisement impact on children, it is obvious that most of legislatures reject the laws restricting the broadcast advertising spots intended for children under 12 years of age, with the exception of the Swedish and the Canadian province of Quebec experiences, which opted for total ban on advertising spots broadcast messages targeting children.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
KHalaf Alhmar and what we get from his poem
...Show More Authors

KHalaf Alhmar and what we get from his poem

View Publication Preview PDF
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
The Psychometric Properties of the Arabic Version of Nomophobia Scale among Omani Youth
...Show More Authors

The current research aimed to investigate the psychometric characteristics of the Arabic version of the Nomophobia scale for the Omani youth. The scale was administered to a random sample of students from public and private universities and colleges in Oman. The research sample consisted of 2507 students, of whom 868 males and 1639 females. The validity of the measure was first checked by presenting the scale to a group of experts in this field. Then the exploratory and confirmatory factor analysis was carried out. The exploratory factor analysis revealed the existence of three main factors: the fear of connectivity loss, the fear of communication loss with others, and the fear of network outages. These factors accounted for 65.6% of the

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 27 2022
Journal Name
Arab Science Heritage Journal
قضية قانونية من العهد الاشوري القديم في بلاد الأناضول
...Show More Authors

  Assyrian merchants established in the second millennium BC Assyrian commercial settlements in Anatolia, and these settlements had a great cultural value

View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
On Faintly θ- Semi-Continuous and Faintly δ-Semi-Continuous Functions
...Show More Authors

      Faintly continuous (FC) functions, entitled faintly S-continuous and faintly δS-continuous functions have been introduced and investigated via a -open and -open sets. Several characterizations and properties of faintly S-continuous and faintly -Continuous functions were obtained. In addition, relationships between faintly s- Continuous and faintly S-continuous function and other forms of FC function were investigated. Also, it is shown that every faintly  S-continuous is weakly S-continuous. The Convers is shown to be satisfied only if the co-domain of the function is almost regular.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
A Comparison Between Two Shape Parameters Estimators for (Burr-XII) Distribution
...Show More Authors

This paper deals with defining Burr-XII, and how to obtain its p.d.f., and CDF, since this distribution is one of failure distribution which is compound distribution from two failure models which are Gamma model and weibull model. Some equipment may have many important parts and the probability distributions representing which may be of different types, so found that Burr by its different compound formulas is the best model to be studied, and estimated its parameter to compute the mean time to failure rate. Here Burr-XII rather than other models is consider  because it is used to model a wide variety of phenomena including crop prices, household income, option market price distributions, risk and travel time. It has two shape-parame

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Recovery of Platinum and Palladium from Scrap Automotive Catalytic Converters
...Show More Authors

Abstract

    

The hydrometallurgical method was used to platinum and palladium leaching with aqua regia solution (3HCl: HNO3). The leaching experiments were designed to obtain the optimum conditions by using Taguchi method with 16 experiments at three different factors (time, temperature and solid to liquid ratio), and each factor has four different levels. In this study, leaching the powder sample of catalytic converter that contains platinum and palladium was conducted on the basis of the formation of chloro complexes platinum and palladium (PtCl62-, PdCl42-) with different concentrations in the acidic solution. The optimum condi

... Show More
View Publication Preview PDF
Crossref (23)
Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Optimization of nanostructured/nano sized rice husk ash preparation
...Show More Authors

The objective of the study is developing a procedure for production and characterization of rice husk ash (RHA). The effects of rice husk (RH) amount, burning/cooling conditions combined with stirring on producing of RHA with amorphous silica, highest SiO2, lowest loss on ignition (LOI), uniform particle shape distribution and nano structured size have been studied. It is concluded that the best amount is 20 g RH in 125 ml evaporating dish Porcelain with burning for 2 h at temperature 700 °C combined with cooling three times during burning to produce RHA with amorphous silica, SiO2 90.78% and LOI 1.73%. On the other hand, cooling and stirring times affect the variation of nano structured size and particle shape dis

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref