Preferred Language
Articles
/
jperc-157
Discipline in the classroom (problems and solutions)
...Show More Authors

Research Summary

First: the problem of research and its importance

      The teacher's success in facilitating the students' learning and growth according to the educational and educational goals set out, he must identify the problems of discipline of students in the classroom in terms of sources and reasons and types and methods of prevention and treatment and the teacher to remember that success in his teaching and instruction is not completed more fully once he has the information And knowledge of the subject of the lesson, but must understand the dynamics of the group (class group) and master the skills of classroom management, such as providing the psychological and social climate appropriate to the process of learning and the use of methods and methods of learning and education based on participation and cooperation and dialogue Consultation to reach the common goals of teaching and learning processes. For this arrogating the researcher to identify the discipline in class solutions and problems

Second: The limits of research were limited to information that could achieve the research objectives

Chapter II Research Methodology The researcher followed an analytical descriptive approach to identify problems and solutions of discipline within the classroom

Class discipline concept

Learning environment

The role of the teacher in controlling the learning environment?

Strategies for solving classroom discipline problems

Chapter III: This chapter contains a number of recommendations and proposals

 First: Recommendations

Minimize the use of corporal punishment, especially to the lowest degree possible

. To give the student an opportunity to discourage bad behavior or direct him to do the right behavior to encourage and strengthen his direction immediately.

Second: Proposals

Preparing a guide for the teacher to familiarize himself with the problems encountered during teaching and the strategy of solving them to achieve discipline class system

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Aug 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Simulation of Sediment Transport in the Upper Reach of Al-Gharraf River
...Show More Authors
Abstract<p>For the past few years, the sediment began to accumulate in Al-Gharraf River which reduces the flow capacity of the River. In the present research, a numerical model was developed using Hec-Ras software, version 5.0.4. to simulate the flow and sediment transport in the upper reach of the river. The hydrological and cross-section data measured by the Ministry of Water Resources, for the reach located between Kut and Hai cities and having a length of 58200 m, was used to perform calibration and verification of the model. Moreover, field sampling of suspended and bed loads was gathered for five months starting from 7/2/2019, and laboratory tests of samples were conducted to be used as in</p> ... Show More
View Publication
Scopus (8)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jun 30 2014
Journal Name
Al-kindy College Medical Journal
The Efficacy of fractional CO2 laser in management of surgical wound scars
...Show More Authors

Background: Atrophic postoperative and traumatic scarring are common cosmetic problems for patients. Combining CO2 laser ablation with a fractional photothermolysis system in a treatment known as ablative fractional resurfacing fulfilling the new demands for a lesser risk of side effects and minimal or no downtime.Objective: To assess the safety and efficacy of ablation fractional CO2 laser treatments for surgical scarring .methods: Twenty one patient ( 14 women, and 7 men ) with various skin types , I to IV , aged 3 to 48 years , presents with 24 scars between June and December 2012 , four patients excluded from study because they are not continued in follow up , the remaining 17 patient completed all 3 treatments & 6 months follow

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Study the Application of Ultrasonic Technology for Phenol Removal in Petroleum Industry
...Show More Authors

In this study, the sonochemical degradation of phenol in water was investigated using two types of ultrasonic wave generators; 20 kHz ultrasonic processor and 40 kHz ultrasonic cleaner bath. Mineralization rates were determined as a function of phenol concentration, contact time, pH, power density, and type of ultrasonic generator. Results revealed that sonochemical degradation of the phenol conversion was enhanced at increased applied power densities and acidic conditions. At 10 mg/L initial concentration of phenol, pH 7, and applied power density of 3000 W/L, the maximum removal efficiency of phenol was 93% using ultrasonic processor at 2h contact time. Whereby, it was 87% using and ultrasonic cleaner bath at 16h contact time and 150 W

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Corporate And Business Strategy Review
The role of learning organizations in crisis management strategy: A case study
...Show More Authors

The problem of the paper focused on the role of the learning organization in the crisis management strategy, and the extent of the actual interest in both the learning organization and the crisis management and aimed at diagnosing and analyzing that and surrounding questions. The Statistical Package for the Social Sciences (SPSS) program was used to calculate the results and the correlation coefficient between the two main variables. The methodology was descriptive and analytical. The case study was followed by a questionnaire that was distributed to a sample of 31 teachers. The paper adopted a seven-dimensional model of systemic thinking that encourages questioning, empowerment, provision of advanced technologies, and strategic lea

... Show More
View Publication
Scopus (13)
Crossref (8)
Scopus Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Prensa Medica Argentina
The effect of niclosamide in acetic-acid induce colitis: An experimental study
...Show More Authors

Scopus (25)
Scopus
Publication Date
Fri Jul 01 2011
Journal Name
Journal Of Craniofacial Surgery
Management of Retained Foreign Bodies in Missile Injuries of the Maxillofacial Region
...Show More Authors

This study evaluates 22 patients with retained foreign bodies in the maxillofacial region that were all caused by penetrating missile injuries. Surgical intervention for the retrieval of the foreign bodies was carried out in 20 patients through the existing wounds and through separate incisions; all patients were followed up for a minimum of 2 months during which all the complications were registered and managed. Preoperative imaging is a prerequisite for the accurate localization of the foreign body and the subsequent successful removal of it. All patients developed complications that were categorized in this study into those that result from the injury itself and those that occur because of the retrieval procedure, the latter category bei

... Show More
View Publication
Scopus (4)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Iraqi Journal Of Physics
Using the plastic wastes in fabrication of composite materials for different applications
...Show More Authors

This study suggests using the recycled plastic waste to prepare the polymer matrix composite (PMCs) to use in different applications. Composite materials were prepared by mixing the polyester resin (UP) with plastic waste, two types of plastic waste were used in this work included polyethylene-terephthalate (PET) and Polyvinyl chloride (PVC) with varies weight fractions (0, 5, 10, 15, 20 and 25 %) added as a filler in flakes form. Charpy impact test was performed on the prepared samples to calculate the values of impact strength (I.S). Flexural and hardness tests were carried out to calculate the values of flexural strength and hardness. Acoustic insulation and optical microscope tests were carried out. In general, it is found that UP/PV

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jun 01 2010
Journal Name
Journal Of The College Of Languages (jcl)
Nature of a holy book in the poetry of Ibn Arabi Mohi
...Show More Authors

The paper discusses the lack of a uniform definition of politeness due to the constant tension between its universality and language specificity, and argues that some of the theoretical debate could be resolved if the distinction between politeness as a commonsense notion and politeness as a theoretical construct were clearly addressed and acknowledged in the research.

View Publication Preview PDF
Publication Date
Wed Jan 24 2024
Journal Name
Pharmacia
Novel anticoagulants in the management of atrial fibrillation: A comprehensive comparative analysis
...Show More Authors

Background: Atrial fibrillation (AF) stands as the most prevalent cardiac arrhythmia, with associated risks of stroke and systemic thromboembolism. While vitamin K antagonists, specifically warfarin, have historically been the mainstay for stroke prevention in AF, they come with inherent limitations.

Aim: This review seeks to offer a comprehensive analysis of the efficacy, safety, and clinical advantages of novel oral anticoagulants (NOACs) compared to traditional warfarin in AF management.

Method: A meticulous examination of pivotal clinical trials, meta-analyses, and recent research publications was conducted.

... Show More
View Publication
Crossref (5)
Crossref
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus Crossref