The aim of the research is to examine the multiple intelligence test item selection based on Howard Gardner's MI model using the Generalized Partial Estimation Form, generalized intelligence. The researcher adopted the scale of multiple intelligences by Kardner, it consists of (102) items with eight sub-scales. The sample consisted of (550) students from Baghdad universities, Technology University, al-Mustansiriyah university, and Iraqi University for the academic year (2019/2020). It was verified assumptions theory response to a single (one-dimensional, local autonomy, the curve of individual characteristics, speed factor and application), and analysis of the data according to specimen partial appreciation of the generalized, and limits its characteristics standard, and the statement of the computerized program outputs (GUMM-2004). Finally, the results verified these assumptions.
This study is marked by: The ignorant poem and body language
Its main objective is to reveal the manifestations of this language in the text mentioned, and accordingly, the sieve poem has been read semantic (semantic) and hermeneutic, revealing the poet's ability to employ symbols and signals (body language) in the poem chosen for this purpose; The existence of such language in pre-Islamic poetry. After a long reflection and reading, the signs and symbols of the physical movement of the body, and its feminine and aesthetic manifestations were identified, and this was achieved through the use of modern critical methodologies that directly affect this language. The study consisted of an introduction and three topics, followed by t
In petroleum reservoir engineering, history matching refers to the calibration process in which a reservoir simulation model is validated through matching simulation outputs with the measurement of observed data. A traditional history matching technique is performed manually by engineering in which the most uncertain observed parameters are changed until a satisfactory match is obtained between the generated model and historical information. This study focuses on step by step and trial and error history matching of the Mishrif reservoir to constrain the appropriate simulated model. Up to 1 January 2021, Buzurgan Oilfield, which has eighty-five producers and sixteen injectors and has been under production for 45 years when it started
... Show MoreThe Security Council has an active role in addressing international crises and dealing with their causes. The Libyan crisis is one of the most important real tests of the Security Council and its role in maintaining international peace and security, as the Council has proven so far an ineffective role in resolving the crisis and dealing withtheir causes, which has prolonged its duration and increased its complexities and dangerous repercussions, perhaps the most prominent of which is the threat of the recently achieved cease-fire and the formation of a new transitional government led by Abdel Hamid al-Dabaiba, the growing significant obstacles facing the political process, foremost of which is the continued presence of foreign forces , m
... Show MoreThis study deals with the intellectual representations whose intellectual systems are incarnated in the Jewish personality, which is considered one of the complex intellectual systems that has caused controversy throughout the ages because of the ambiguity due to the religious and psychological factors that were reflected directly and strongly on the intellectual structure of the Jewish community in general and the Jewish - Zionist personality in particular, in an attempt (to create new dimensions embodied by intellectual representations of a human nature embodied by what that - peaceful - religiously oppressed - psychologically and socially isolated character presents, because of the curse of the peoples of the world that was a cause fo
... Show MoreThe mathematical construction of an ecological model with a prey-predator relationship was done. It presumed that the prey consisted of a stage structure of juveniles and adults. While the adult prey species had the power to fight off the predator, the predator, and juvenile prey worked together to hunt them. Additionally, the effect of the harvest was considered on the prey. All the solution’s properties were discussed. All potential equilibrium points' local stability was tested. The prerequisites for persistence were established. Global stability was investigated using Lyapunov methods. It was found that the system underwent a saddle-node bifurcation near the coexistence equilibrium point while exhibiting a transcritical bifurcation
... Show MoreThe research aims to find the impact of a proposed strategy according to the Luria model on realistic thinking among fifth-class scientific students and their achievement in mathematics. To achieve it, the experimental research method and the quasi-experimental design were used for two equal groups, one of them is a control group taught in traditional way and the other is an experimental one taught according to strategy based on Luria model. The research community represents the students of the fifth scientific class from the General Directorate of Education of Karkh First. The research sample (40) students were deliberately chosen and distributed equally between the two groups after making sure that they were equals in their previo
... Show MoreThe -multiple mixing ratios of γ-transitions from levels of populated in the are calculated in the present work by using the a2-ratio methods. We used the experimental coefficient (a2) for two γ-transitions from the same initial state, the statistical tensor, which is related to the a2-coefficient would be the same for the two transitions. This method was used in a previous work for pure transitions or which can be considered pure. In these cases the multiple mixing ratios for the second transition ( ) equal zero, but in our work we applied this method for mixed γ-transitions and then the multiple mixing ratio ( ) is known for one transition. Then we calculate the ( ) value and versareversa. The weight average of the -values calcu
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreWatermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show More