The aim of the research is to design educational software based on Web Quests and to measure its effectiveness in developing information search skills of students at the Department of Educational and Psychological Sciences. The research is experimental in nature using pre-post measurement. The research sample consisted of (91) male and female students from the second grade in the Department of Educational and Psychological Sciences, they were divided into two equal groups; the experimental group consisted of (47) students who adopted the educational software as a studying method, and the control group consisted of (44) students who follow the traditional method. The researchers prepared a list of skills for searching information and they designed an educational program based on Web Quests. The results of the research concluded that the students of the experimental group outperformed the students of the control group in both the cognitive and practical tests of skills for searching information. The results confirm the effectiveness of educational software based on Web Quests in developing information search skills.
Objective: To determine the effectiveness of the Nursing Management Education Program upon the Nurse
Managers' Knowledge about planning in Nursing Management at Baghdad City Hospitals.
Methodology: A Quasi-experimental study in which a purposive "non-probability" sample of (50) Nurse
Managers was selected from Baghdad City Hospitals. These Managers were divided into two equal groups of
(25) Nurse Managers for each (study and control ones). A questionnaire was developed as a tool for data
collection. A pilot study was carried out to test the reliability of the questionnaire for the period from April 2nd to
June 20th 2007. The pre-post test approach was applied to the study and control groups as mean for the quasiexperime
This research aims to find out the relationship of risk behavior & job satisfaction for workers in the emergency program in the international relief agency (UNRWA) in the Gaza Strip and the level of each of them, and to achieve that we have been conducting research on the strength of "210" sample employees of the emergency program staff in the international relief agency in Gaza governorates, and try to answer the research questions the researcher through the use of measurements of risk behavior and job satisfaction are two of the researcher, The researcher has used several statistical methods to identify the validity and reliability of scales and access to research and interpretations of the results, and these methods: the m
... Show MoreThe developing countries, like our country Iraq suffer from deep comprehensive structural crisis, manifestations and a clear imbalance between the demand and the supply sides. The overall imbalance in the external balance. As a consequence, this caused the accumulation of foreign debts or failure in the implementation of economic development programs. The countries which are forced to resort to the International Monitoring Funds, and the World Bank for assistance and to express an opinion on policies that include restrictions controls that belong to the monetary, and fiscal side group, imposed on the economies crisis, as a condition for returning to normal which called reform programs. The organize of the events of radical changes in the
... Show MoreThe research aimed at designing teaching sessions using the self-scheduling strategy with a competitive style in learning handball as well as identifying differences between pre and post tests in both groups in learning short and long passes in handball. The researchers used the experimental method on 2nd-grade secondary school students. The researchers concluded using the self-scheduling strategy due to its positive effect on learning short and long handball passes in handball. Finally, the researchers recommended applying strategies and styles in teaching different school levels as well as making similar studies using teaching strategies and styles for learning handball skills in students.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More