The aim of the research is to examine the multiple intelligence test item selection based on Howard Gardner's MI model using the Generalized Partial Estimation Form, generalized intelligence. The researcher adopted the scale of multiple intelligences by Kardner, it consists of (102) items with eight sub-scales. The sample consisted of (550) students from Baghdad universities, Technology University, al-Mustansiriyah university, and Iraqi University for the academic year (2019/2020). It was verified assumptions theory response to a single (one-dimensional, local autonomy, the curve of individual characteristics, speed factor and application), and analysis of the data according to specimen partial appreciation of the generalized, and limits its characteristics standard, and the statement of the computerized program outputs (GUMM-2004). Finally, the results verified these assumptions.
John Dewey is an American philosopher and psychologist. He is one of the primary figures of the philosophy of pragmatism. He is considered one of its founders and one of the leaders of the philosophy of pragmatism. He is one of the most famous figures of the modern education on the international level. His name is associated with the philosophy of education, because he delved in defining the purpose of education and went on talking about linking the theories with the reality without being subject to the existing system and the inherited traditions no matter how ancient they were. He is the godfather of progressive or gradual education, and he is one of the pioneers who established the experimental school in America in cooperation
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe current research deals with the specificity of the interior design of the classes of art education in the schools of excellence for the province of Muthanna and its center of the city of Samawah. In the first chapter، the problem of research was determined by the lack of internal spaces of the classes of art education to designs that meet the requirements and needs of students in these educational stages. The importance of the research in being an addition to knowledge in the field of interior design and engineering department of the general directorates of the Ministry of Education. The objectives of the research were determined through.
- Identifying the reality of the halls of art education for sch
This paper shews how to estimate the parameter of generalized exponential Rayleigh (GER) distribution by three estimation methods. The first one is maximum likelihood estimator method the second one is moment employing estimation method (MEM), the third one is rank set sampling estimator method (RSSEM)The simulation technique is used for all these estimation methods to find the parameters for generalized exponential Rayleigh distribution. Finally using the mean squares error criterion to compare between these estimation methods to find which of these methods are best to the others
Abstract:
Current research has sought to apply the criteria of potential for altmizalaorbi model EFQM 2013 in assessing the performance of the Inspector General's Office/Ministry of health, so as to keep up with a modern and advanced management methods in the evaluation of performance, as well as to link performance to a citizen's life, and it takes him beyond the accepted service capabilities today, but of budget duties between dealers servicing responsibilities and future planning, financial control, competitiveness, human resources needs and maintaining quality and development, as well as the constant quest for continuous improvement, is the spirit of the principle underpinning the European Foundation Quality managemen
... Show MoreThe research dealt with a comparative study between some semi-parametric estimation methods to the Partial linear Single Index Model using simulation. There are two approaches to model estimation two-stage procedure and MADE to estimate this model. Simulations were used to study the finite sample performance of estimating methods based on different Single Index models, error variances, and different sample sizes , and the mean average squared errors were used as a comparison criterion between the methods were used. The results showed a preference for the two-stage procedure depending on all the cases that were used
The cost of pile foundations is part of the super structure cost, and it became necessary to reduce this cost by studying the pile types then decision-making in the selection of the optimal pile type in terms of cost and time of production and quality .So The main objective of this study is to solve the time–cost–quality trade-off (TCQT) problem by finding an optimal pile type with the target of "minimizing" cost and time while "maximizing" quality. There are many types In the world of piles but in this paper, the researcher proposed five pile types, one of them is not a traditional, and developed a model for the problem and then employed particle swarm optimization (PSO) algorithm, as one of evolutionary algorithms with t
... Show More