Preferred Language
Articles
/
jperc-1387
The Level of Inclusion of Citizenship Values in English Language Textbooks “We Can Series” for the Elementary Education in the Kingdom of Saudi Arabia
...Show More Authors

Abstract

The study aims to reveal the level of inclusion of citizenship values in the English language textbooks (We Can) series for elementary education in the Kingdom of Saudi Arabia. To achieve this objective, the "content analysis" methodology was used. A content analysis card was designed to include (6) main areas of citizenship values, it consisted of (28) sub-indicators of citizenship values that were supposed to be included in the English language textbook series (We Can) for elementary education. The study sample consisted of all the English language textbooks (We Can) series for elementary education, which consisted of (6) textbooks, two for each class. The results of the study indicated that there is a low level of inclusion of citizenship values in the books of all grades, as the repetition rate reached (30.4%) in the fourth-grade textbooks, (25.8%) in the fifth-grade textbooks, (43.6%)  in the sixth-grade textbooks. In total,  (11) citizenship values out of (28) values with a percentage of (39.2%) were not included at all in the English language textbooks (We Can) series for elementary education. The results also indicated that there are not statistically significant at the level (0.05) due to the grade variable in the level of inclusion of citizenship values. In contrast, the Chi-Square Test of Independence indicated that the significance level was (0.38).

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud
...Show More Authors

Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of

... Show More
View Publication Preview PDF
Publication Date
Wed May 01 2024
Journal Name
Tropical Journal Of Pharmaceutical Research
Validation of UV-visible spectrophotometric method for niclosamide in different media
...Show More Authors

Purpose: To validate a UV-visible spectrophotometric technique for evaluating niclosamide (NIC) concentration in different media across various values of pH. Methods: NIC was investigated using a UV-visible spectrophotometer in acidic buffer solution (ABS) of pH 1.2, deionized water (DW), and phosphate buffer solution (PBS), pH 7.4. The characterization of NIC was done with differential scanning calorimeter (DSC), powder X-ray diffraction (XRD), and Fourier transform infrared spectroscopy (FTIR). The UV analysis was validated for accuracy, precision, linearity, and robustness. Results: The DSC spectra showed a single endothermic peak at 228.43 °C (corresponding to the melting point of NIC), while XRD and FTIR analysis confirmed the identit

... Show More
Scopus
Publication Date
Mon Feb 27 2023
Journal Name
Applied Sciences
Comparison of ML/DL Approaches for Detecting DDoS Attacks in SDN
...Show More Authors

Software-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for quickly identifying and mitigating anomalies. To this end, this research employs various classification methods, including support vector machines (SVMs), K-nearest neighbors (KNNs), decision trees (DTs), multiple layer perceptron (MLP), and convolutional neural networks (CNNs), and compares their performance. CNN exhibits the highest train accuracy at 97.808%, yet the lowest prediction accuracy at 90.08%. In contrast, SVM demonstrates the highest prediction accuracy of 95.5%. As such, an

... Show More
View Publication
Scopus (48)
Crossref (46)
Scopus Clarivate Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
A Factorial Study for separation anxiety in students, of Baghdad City
...Show More Authors

A Factorial Study for separation anxiety in students, of Baghdad City

View Publication Preview PDF
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
In Situ Gelling Formulation of Naproxen for Oral Sustained Delivery System
...Show More Authors

Naproxen is non-steroidal anti-inflammatory drug, which has antipyretic and anti-inflammatory effect. It is extensively bound to plasma albumin, and exhibits gastric toxicity, so it may be more efficient to deliver the drug in its sustained release dosage form and adequate blood level is achieved. Three liquid formulations with in situ gelling properties have been assessed for their potential for the oral sustained delivery of naproxen . The formulations were dilute solutions of: (a) pectin; (b) gellan gum and; (c) sodium alginate, all containing complexed calcium ion that form gels when these ions are released in the acidic environment of the stomach . The viscosity of the sols and drug release were measured, and was found to be depende

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
Proposed model for data protection in information systems of government institutions
...Show More Authors

Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Sep 28 2022
Journal Name
Journal Of The College Of Education For Women
A Cognitive Linguistic Study of Battered Woman in Selected Iraqi Caricatures
...Show More Authors

The present paper is a qualitative descriptive study. It aims to examine the macro-cultural schemata addressing the concept of violence against women in Iraq from a cognitive linguistic point of view. To meet this objective, a number of Iraqi social caricatures have been selected from two popular and active Iraqi caricaturists, Odeh Al-Fahdawi and Nasser Ibrahim. The selection and the analysis of data have been achieved following the validity and reliability procedures and the ethical considerations. To meet this objective, Sharifian’s Model (2011) of Cultural Schemata has been adopted in data analysis. The study has concluded that the macro-cultural schemata regarding the concept of violence in the selected panels reveals that violenc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 04 2017
Journal Name
Baghdad Science Journal
The Effect of Variety and Gibberellic acid and Brassinolide and their Interaction on Some of The Chemical Characteristics and Total chlorophyll of the plant Dill Anethum graveolens L.
...Show More Authors

The experiment was carried out to study the effect of variety and gibberellic acid in concentration (0 and 50)mg.lat-1 and BL in five concentration (0, 0.50 ,1 ,2 and 3)mg.ltr-1 and their interaction in some chemical Characteristics and total chlorophyll for Dill plant . the experiment designed according Randomized Complete Block Design (RCBD) and three replicates per treatment, compared to the average using less significant difference at the level of probability (0.05) , the results showed the following:- The effect of brassinolide with it,s concentrations led to obtain a significant increase in all the studied characteristics, so the superiority of the concentration of 2 mg.L-1 of brassinolide in each of Ca, Mg,Fe, and total chlorophyll T

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Evaluating the reality of applying the curriculum axis according to the Iraqi academic accreditation standards / a comparative study of a sample of governmental and private universities and colleges
...Show More Authors

The research aims to get acquainted with the evaluation of the reality of the application of the curriculum axis from among the eight Iraqi academic accreditation standards in a sample of governmental and private universities and colleges in Iraq and to identify the main and secondary reasons for it as well as to provide proposed mechanisms and procedures to help reduce gaps, If the research problem is represented in the weak availability of the requirements of the curriculum axis in universities and colleges (the study sample) due to the weak documentation and successful implementation of them and interest in them is still below the level of ambition, In order to arrive at scientific facts, the researchers adopted the comparativ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Pakistan Journal Of Medical And Health Sciences
Evaluation of Cytotoxic T-Lymphocyte Antigen 4 Polymorphism and Soluble Immune Checkpoint Level Among A Sample of Sars-Cov-2 Iraqi Patients
...Show More Authors

Objective: To Evaluate the Roley of Cytotoxic T-Lymphocytek antigen 4 Polymorphism and soluble immune checkpoint level (PD-1,PDL-1 and CTLA-4 ) in SARS-Cov-2 patients. Methods: Fromt October 2020 to April 2021, the currentk study was conducted in Baghdad-Iraq. Ninety patients with Confirmatory SARS-Cov-2 by PCR were inclusion in the study, and they were seeking treatment at Medical City in Baghdad's Teaching Hospital (BTH). Patients with SARS-Cov-2 were divided into two groups: those with Sever SARS-Cov-2 symptom and those with mild - moderate SARS-Cov-2 symptoms (cross sectional study. Patients with another form of autoimmune illness, malignant, diabetes, under the age of 18 and pregnant women were excluded. Results: Data rega

... Show More
View Publication Preview PDF
Crossref (3)
Crossref