Preferred Language
Articles
/
jperc-1224
The extent of including logical intelligence in the Book of chemistry for the fifth Grade of science
...Show More Authors

The aim of the current research to determine the extent of logical intelligence in the book of chemistry for the fifth grade of science and to achieve the goal the researcher has prepared a special criterion in the areas of logical intelligence main and sub-to be included in the book after reviewing the previous literature and studies in this regard may be the final form after presentation to experts and arbitrators in the field of Educational and psychological sciences, curricula and teaching methods from (3) main areas and (21) sub-fields, then the researcher analyzed the book Bibih and applied branches and adopted the idea of ​​both explicit and implicit as a unit of registration and repetition as a unit of the census, The results showed that the book included (290) repetitions as the biological branch ranked first with (160) repetition rate (55.17%), and the second branch applied (130) repetition rate (44.83%). Based on the results, the researcher recommended the need to include the book for the main and sub-logical intelligence areas in an integrated and balanced manner according to scientific developments, and suggested several proposals, including a study to know the impact of logical intelligence on the achievement of preparatory stage

Students in chemistry and their ability to solve problems, note that the statistical

Methods that Adopted is the Holste equation and percentage. 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Boubaker Wavelets Functions: Properties and Applications
...Show More Authors

This paper is concerned with introducing an explicit expression for orthogonal Boubaker polynomial functions with some important properties. Taking advantage of the interesting properties of Boubaker polynomials, the definition of Boubaker wavelets on interval [0,1) is achieved. These basic functions are orthonormal and have compact support. Wavelets have many advantages and applications in the theoretical and applied fields, and they are applied with the orthogonal polynomials to propose a new method for treating several problems in sciences, and engineering that is wavelet method, which is computationally more attractive in the various fields. A novel property of Boubaker wavelet function derivative in terms of Boubaker wavelet themsel

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Apr 10 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
أثر خصائص لجنة التدقيق في الإفصاح عن رأس المال الفكري: أدلة من فسطين: The Impact of Audit committee characteristics on Intellectual capital disclosure : Empirical evidence from Palestine
...Show More Authors

The study aimed to examine the impact of audit committee characteristics on the practices of intellectual capital disclosure in the annual reports of Bank and Insurance companies listed on Palestine Exchange, through performing content analysis of the annual reports for the study sample which totaled thirteen companies, including six banks and seven insurance companies. To achieve the study objectives, the study employed a content analysis approach in order to analyze the content of the intellectual capital disclosure practice, in addition, the study used cross-sectional with longitudinal data for time series for a period of time between 2014-2019. The empirical results indicated that financial expertise and the number of meeting

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 02 2022
Journal Name
Journal Of Legal Sciences
Procédures pour infliger des sanctions disciplinaires au travailleur selon la loi irakienne du travail n ° (37) de 2015 (une étude comparative avec les lois du travail en Algérie, aux Émirats arabes unis et en France
...Show More Authors

The procedures for imposing disciplinary sanction against the worker represent the steps that must be followed to verify the violation attributed to the worker in preparation for taking the decision to impose disciplinary sanction on him in terms of the procedures for carrying it out, i.e. from the moment of the disciplinary violation until the judgment thereof, as well as the rights, obligations and legal ties resulting from these procedures, These procedures are governed by multiple and dispersed rules, and they aim in their entirety to control the discipline process and determine its course by adhering to the restrictions stated in the law that regulate the process of imposing them, and perhaps one of the most important of these proce

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 22 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
المسار النموذجي لتدقيق اداء الدور الاشرافي للبنك المركزي العراقي على المصارف الخاصة على وفق معايير الاجهزة العليا للرقابة المالية والمحاسبة: بحث تطبيقي في ديوان الرقابة المالية الاتحادي
...Show More Authors

With today's rapid and full of dangers the world banking sector is one of the most vital sectors at risk, and on the supervisory bodies responsible for monitoring the work of banks to take an active role in influencing the banks and put on the right track and is compatible with internationally approved curriculum. The lie of the research problem in the weak supervisory role of the Central Bank for banks in general and private banks in particular, limited the process of performance audit carried out by the Federal Office of Financial Supervision in auditing oversight role of the Central Bank control over the banks, according to the methods of performance audit followed by the upper bodies of financial control and accounting, And it was ba

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2013
Journal Name
مجلة كلية بغداد للعلوم الاقتصادية الجامعة
Proposed family speech recognition
...Show More Authors

Speech recognition is a very important field that can be used in many applications such as controlling to protect area, banking, transaction over telephone network database access service, voice email, investigations, House controlling and management ... etc. Speech recognition systems can be used in two modes: to identify a particular person or to verify a person’s claimed identity. The family speaker recognition is a modern field in the speaker recognition. Many family speakers have similarity in the characteristics and hard to identify between them. Today, the scope of speech recognition is limited to speech collected from cooperative users in real world office environments and without adverse microphone or channel impairments.

Publication Date
Tue Sep 25 2018
Journal Name
Iraqi Journal Of Science
Age Estimation Using Support Vector Machine
...Show More Authors

Recently there has been an urgent need to identify the ages from their personal pictures and to be used in the field of security of personal and biometric, interaction between human and computer, security of information, law enforcement. However, in spite of advances in age estimation, it stills a difficult problem. This is because the face old age process is determined not only by radical factors, e.g. genetic factors, but also by external factors, e.g. lifestyle, expression, and environment. This paper utilized machine learning technique to intelligent age estimation from facial images using support vector machine (SVM) on FG_NET dataset. The proposed work consists of three phases: the first phase is image preprocessing include four st

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
A Real-Time Fuzzy Load Flow and Contingency Analysis Based on Gaussian Distribution System
...Show More Authors

Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed  method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Study on Flow Characteristics and Heat Transfer Behavior Around Different Geometrical Corrugated Extended Surfaces
...Show More Authors

Abstract

The current study presents numerical investigation of the fluid (air) flow characteristics and convection heat transfer around different corrugated surfaces geometry in the low Reynolds number region (Re<1000). The geometries are included wavy, triangle, and rectangular. The effect of different geometry parameters such as aspect ratio and number of cycles per unit length on flow field characteristics and heat transfer was estimated and compared with each other. The computerized fluid dynamics package (ANSYS 14) is used to simulate the flow field and heat transfer, solve the governing equations, and extract the results. It is found that the turbulence intensity for rectangular extended surface was larg

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Data Classification using Quantum Neural Network
...Show More Authors

In this paper, integrated quantum neural network (QNN), which is a class of feedforward

neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
CONSTRUCTION DELAY ANALYSIS USING DAILY WINDOWS TECHNIQUE
...Show More Authors

Delays occur commonly in construction projects. Assessing the impact of delay is sometimes a contentious
issue. Several delay analysis methods are available but no one method can be universally used over another in
all situations. The selection of the proper analysis method depends upon a variety of factors including
information available, time of analysis, capabilities of the methodology, and time, funds and effort allocated to the analysis. This paper presents computerized schedule analysis programmed that use daily windows analysis method as it recognized one of the most credible methods, and it is one of the few techniques much more likely to be accepted by courts than any other method. A simple case study has been implement

... Show More
View Publication Preview PDF
Crossref (2)
Crossref