The aim of the research is to examine the multiple intelligence test item selection based on Howard Gardner's MI model using the Generalized Partial Estimation Form, generalized intelligence. The researcher adopted the scale of multiple intelligences by Kardner, it consists of (102) items with eight sub-scales. The sample consisted of (550) students from Baghdad universities, Technology University, al-Mustansiriyah university, and Iraqi University for the academic year (2019/2020). It was verified assumptions theory response to a single (one-dimensional, local autonomy, the curve of individual characteristics, speed factor and application), and analysis of the data according to specimen partial appreciation of the generalized, and limits its characteristics standard, and the statement of the computerized program outputs (GUMM-2004). Finally, the results verified these assumptions.
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreThe study aimed to identify the importance of time in the Faculties of Physical Education and Sports Sciences atthe University of Baghdad, as well as to identify the relationship between time management and the level of staff functionalperformance. The research population consisted of the staff members who work in the Faculties of Physical Education andSports Sciences for Girls in Al-Jadriya for the academic year 2017-2018. A random sample of 50 staff members from eachfaculty were selected, that is the total number was (100) staff members. The researchers identified the concept of timemanagement and functional performance, after that a questionnaire consisting of (39) statements and (6) parts presented to aspecialized group of experts. The
... Show MoreThe study aimed to identify the importance of time in the Faculties of Physical Education and Sports Sciences at the University of Baghdad, as well as to identify the relationship between time management and the level of staff functional performance. The research population consisted of the staff members who work in the Faculties of Physical Education and Sports Sciences for Girls in Al-Jadriya for the academic year 2017-2018. A random sample of 50 staff members from each faculty were selected, that is the total number was (100) staff members. The researchers identified the concept of time management and functional performance, after that a questionnaire consisting of (39) statements and (6) parts presented to a specialized group of experts
... Show MoreThis study aimed to identify the role of school administration in achieving educational and learning goals from the point of view of educational supervisors in the stage of basic education. The descriptive method was adopted. As for the sample size, it has reached (59) educational supervisors. A questionnaire consisting of 29 paragraphs divided into four areas was used. The data were statistically analyzed on the Chi-square test, the percentage, and the mono-variance analysis. The result showed that the school administration contributes to achieving educational goals. It also works to solve problems in democratic ways, and in modern methods, there are differences in the criteria for choosing the headmaster. The study recommended that sch
... Show MoreAbstract:
the current research aims at analyzing the efficiency of the private university teaching that recently expanded after 2003 ,;besides , the commitment of the private colleges ,definitely Al-Maamun and Al-Mansour colleges with strategy of the ministry of higher education and scientific research. This could be done through many indications that measure the efficiency of the private university teaching , including ( the indication of the efficiency of using human resources and efficiency in using the materialistic indications. But the human efficiency in these colleges , including the sample of the research ( Maamun
... Show More