This study investigated the effect of using brainstorming as a teaching technique on the students’ performance in writing different kinds of essays and self regulation among the secondary students. The total population of this study, consisted of (51) female students of the 5th Secondary grade in Al –kawarzmi School in Erbil during the academic year 2015-2016. The chosen sample consisted of 40 female students, has been divided into two groups. Each one consists of (20) students to represent the experimental group and the control one. Brainstorming technique is used to teach the experimental group, and the conventional method is used to teach the control group. The study instruments used for collecting the data are an essay writing test and Academic Self-regulated Learning Scale. The performance on an essay writing task and Academic Self-regulated Learning Scale has been taken into account as the pretest and posttest in both groups. The validity and reliability of the study instruments are acceptable. T-test formula is used to analyze the data collected. The analysis results show that the experimental group's performance and self- regulation are significantly higher than the performance and self regulation of the control group at (0.05) level of significance. Therefore, the brainstorming teaching technique significantly affects the students’ performance in writing essays and self- regulation.
Routing protocols are responsible for providing reliable communication between the source and destination nodes. The performance of these protocols in the ad hoc network family is influenced by several factors such as mobility model, traffic load, transmission range, and the number of mobile nodes which represents a great issue. Several simulation studies have explored routing protocol with performance parameters, but few relate to various protocols concerning routing and Quality of Service (QoS) metrics. This paper presents a simulation-based comparison of proactive, reactive, and multipath routing protocols in mobile ad hoc networks (MANETs). Specifically, the performance of AODV, DSDV, and AOMDV protocols are evaluated and analyz
... Show MoreSoftware-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for quickly identifying and mitigating anomalies. To this end, this research employs various classification methods, including support vector machines (SVMs), K-nearest neighbors (KNNs), decision trees (DTs), multiple layer perceptron (MLP), and convolutional neural networks (CNNs), and compares their performance. CNN exhibits the highest train accuracy at 97.808%, yet the lowest prediction accuracy at 90.08%. In contrast, SVM demonstrates the highest prediction accuracy of 95.5%. As such, an
... Show MoreIn this article, a continuous terminal sliding mode control algorithm is proposed for servo motor systems. A novel full-order terminal sliding mode surface is proposed based on the bilimit homogeneous property, such that the sliding motion is finite-time stable independent of the system’s initial condition. A new continuous terminal sliding mode control algorithm is proposed to guarantee that the system states reach the sliding surface in finitetime. Not only the robustness is guaranteed by the proposed controller but also the continuity makes the control algorithm more suitable for the servo mechanical systems. Finally, a numerical example is presented to depict the advantages of the proposed control algorithm. An application in the rota
... Show MoreIn this paper, the dynamical behavior of a three-dimensional fractional-order prey-predator model is investigated with Holling type III functional response and constant rate harvesting. It is assumed that the middle predator species consumes only the prey species, and the top predator species consumes only the middle predator species. We also prove the boundedness, the non-negativity, the uniqueness, and the existence of the solutions of the proposed model. Then, all possible equilibria are determined, and the dynamical behaviors of the proposed model around the equilibrium points are investigated. Finally, numerical simulations results are presented to confirm the theoretical results and to give a better understanding of the dynami
... Show MoreWe present the notion of bipolar fuzzy k-ideals with thresholds (
Background: Schneiderian first rank symptoms are
considered highly valuable in the diagnosis of
schneideria.
They are more evident in the acute phase of the
disorder and fading gradually with time. Many studies
have shown that the rate of these symptoms are
variable in different countries and are colored by
cultural beliefs and values.
Objectives: To find out the rate of Schneiderian first
rank symptoms among newly diagnosed schizophrenic
patients, to assess which symptom(s) might
predominate in those patients, and to find out if there
is/are any correlation(s) between the occurrence of
these symptoms and the sex of the patients.
Methods: Out of twenty-four patients with no past
psychiatric hi
Background: Primary Health care (PHC) is unanimous to be the cornerstone of a person-centered health system. While the adoption of a well-function, two-way, and organized referral system is the mainstay in the development of an efficient healthcare delivery system.
Objective: To Assess the practice & opinion of doctors in the hospitals toward the referral system. to determine the doctors in the hospital's commitment to referral system instructions and guidelines.
Subjects and Methods: A cross-sectional study with analytic elements was conducted in nine Iraqi governorates. Eight doctors from each health directorate, resulting in a tot
... Show MoreDuring a period of two years, from January 1995 till December 1996, the first survey on fish parasites in Bahr Al-Najaf depression, mid Iraq, was achieved. A total of 6992 fishes, belonging to 11 species, were collected and inspected for external and internal parasites. These fishes were infected with three protozoans (Ichthyophthirius multifiliis, Trichodina domerguei and Myxobolus pfeifferi), two monogeneans (Dactylogyrus cornu and Gyrodactylus elegans), two digenetic trematodes (Clinostomum complanatum and Ascocotyle coleostoma), one nematode (Contracaecum sp.) and one acanthocephalan (Neoechinorhynchus iraqensis). Five fish species were recorded as new h
... Show MoreRotating cylinder electrode (RCE) is used . in weight loss technique , the salinity is 200000 p.p.m, temperatures are (30,5060,7080Co) . the velocity of (RCE) are (500,1500,3000 r.p.m). the water cut (30% , 50%). The corrosion rate of carbon steel increase with increasing rotating cylinder velocity. In single phase flow, an increase im rotational velocity from 500 to 1500 r.p.m, the corrosion rate increase from 6.88258 mm/y to 10.11563 mm/y respectively.
In multiphase flow, an increase in (RCE) from 500 to 1500 r.p.m leads to increase in corrosion rate from 0.786153 to 0.910327 mm/y respectively. Increasing brine concentration leads to increase in corrosion rate at water cut 30%.