The aim of the research is to examine the multiple intelligence test item selection based on Howard Gardner's MI model using the Generalized Partial Estimation Form, generalized intelligence. The researcher adopted the scale of multiple intelligences by Kardner, it consists of (102) items with eight sub-scales. The sample consisted of (550) students from Baghdad universities, Technology University, al-Mustansiriyah university, and Iraqi University for the academic year (2019/2020). It was verified assumptions theory response to a single (one-dimensional, local autonomy, the curve of individual characteristics, speed factor and application), and analysis of the data according to specimen partial appreciation of the generalized, and limits its characteristics standard, and the statement of the computerized program outputs (GUMM-2004). Finally, the results verified these assumptions.
The study of cooperative education is important not only for researchers but also for those interested in studying educational methods, such as university professors, teachers in schools, and all educational institutions. This is because of its effectiveness in teaching students, developing their skills, developing their ideas and employing them in the study and finding appropriate solutions to the questions posed by the teacher. It also helps in instilling a spirit of cooperation among the students by dividing them into groups to achieve the desired goals. The aim of the study is to clarify how important it is for teachers to use cooperative education in addressing the educational, social and psychological aspects when teaching stu
... Show MoreLevels of primary education are varying in Sulaimaniyah Province, which defines as a lower stage of education process and seems to be found in most settlements to save the individual and community from illiteracy in its traditional notion which means the individuals, potentiality for reading and writing if he/she graduated from this stage successfully. The research can put the priority for goodness of primary education service within Sulaimaniyah Province that includes Sulaimaniyah city as a dominance based on statistical indicator which called the standardized score (z). The indicator (z) calculated for the basic items of primary education to diagnosis the range of developing that service in Sulaimaniyah city especially and put
... Show MorePublic relations have become vital functions in modern institutions in the complex business world. They play an important role in facilitating the process of communication between the institution and its audiences and achieve mutual understanding between the parties as public relations play this important role based on research and analysis, policy formulation and programming programs and communication with the public.
The significance of this research comes from the challenges faced by public relations in state institutions. Misunderstandings and ambiguities still plague most workers in this field, especially in defining the concept, objectives and basic functions of public rela
... Show MoreObjective:To measure the acceptance level of the Personal Digital Assistance (PDA)’suse among nursing students as a tool of education in the Kingdom of Saudi Arabia. Methodology: Eighty-nine nursing students participated in this cross-sectional descriptive study by completing a questionnaire based on the Technology Acceptance Model (TAM) by Davis. Two dimensions were explored and evaluated; (1) the applicability of the TAM model in assessing this technology; and (2) the overall percentage of students’ agreement on the different TAM variables. Results: This study presented significant positive influence bet
DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreThe current research aims to find out ( the effectiveness of the structural model of learning in the acquisition of geographical concepts at the first grade average students ) , and achieving the goals of research has been formulating the null hypothesis of the following :
" There is no difference statistically significant when Mistoi (0.5 ) between the mean scores of the collection of students in the experimental group that is studying the general geographical principles " Bonmozj constructivist learning " and the mean scores of the control group , which is considering the same article ," the traditional way " to acquire concepts.
The researcher adopted th
... Show MoreAbstract
This research deals will the declared production planning operation in the general company of planting oils, which have great role in production operations management who had built mathematical model for correct non-linear programming according to discounting operation during raw materials or half-made materials purchasing operation which concentration of six main products by company but discount included just three products of raw materials, and there were six months taken from the 1st half of 2014 as a planning period has been chosen . Simulated annealing algorithm application on non-linear model which been more difficulty than possible solution when imposed restric
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show More