The current research aims to study (the effect of strategy of analysis - synthesis duality in the collection of scientific fourth stage students and high-order thinking in Biology material). For evidence the objective of the research, the researcher formulated the following two null hypotheses: 1. There is no significant difference at the statistical level (0.05) between the average of scores of the experimental group students that will study according to the dualism strategy of analysis and structure and the average of scores of the controlled group students that will study according to the normal way in the collection. 2. There is no significant difference at the statistical level (0.05) between the average of scores of the experimental group students that will study according to the dualism strategy of analysis and structure and the average of scores of the controlled group students that will study according to the normal way to test high-order thinking. A current research was Identified by choosing scientific fourth stage students in the governmental diurnal secondary schools which obey to Baghdad education directorate / the first Karkh of studious year (2014- 2015), and among these schools the researcher selected Ajnadayn secondary of girls as a purposive sample. To achieve the aim of research, the researcher used experimental design a partial control, and was selected two divisions of the scientific fourth stage randomly, one of them represent the experimental group and another the controlled group. The sum of research sample was 69 students, 34 students of them in the experimental group and 35 students in the controlled group .The two groups of search were tested by four variables (the time age measured by months, scores of biology material in the test of end of the first course, the test of intelligence, and the scores of test of previous biology information) in addition adjust the other variables, also the scientific material was defined with the last five chapters of the Book of Biology which is scheduled to teach of studious year (2014- 2015). The behavioral objectives were formulated of these chapters and numbered 256 behavioral objective represented to six levels of Bloom's Taxonomy in the knowledge field (remember, absorbing, application, analysis, structure, and evaluation). The tutorial plans were prepared for the two groups of research and numbered 22 plans for each group. The researcher taught herself the two groups during the period of the experiment, which continued 11 weeks of the second semester of the academic year (2014-2015). With respect to research tools, the researcher used one tool for each dependent variable, as prepared collection test of last five chapters of the book of Biology of the scientific fourth stage consisted of 47 items represented the substantive questions, as well as the researcher adopted test of study in high-order thinking consisting of 30 items represented in the two types of questions: 15 objective paragraphs and 15 essay paragraphs, were checking the veracity of tools through articles on a group of arbitrators, have been applied to investigational samples one of them to see how clear paragraphs and time of answer and the other was for the purpose of test statistically analyzed by extracting Alsiakeomtraha characteristics, in addition to the extraction of the stability for both tests. After the end of the experiment, the two tools were applied on groups of search, then the students, answers were corrected and they were treated statistically, and the results were as the following: 1. There are statistically significant differences in favor of the experimental group in the collection test and the size of the average effect of the independent variable was (0.63). 2. There are statistically significant differences in favor of the experimental group in the high-order thinking test and the size of the average effect of the independent variable was (0.5). The results indicated that there is a positive effect of teaching by strategy of analysis – synthesis duality on the collection and the high-order thinking, and based on that the researcher put a set of conclusions, recommendations, suggestions.
The main idea that led me to write such research paper within the framework of Germanic linguistics is that I have not found any topic dealing with the term correlate in the German language, except in several articles in linguistic journals as well as one topic in a book describing the use of such a linguistic phenomenon in the language system. The research initially deals with the definition of the correlate at the level of the German language system. Correlate is unity describes specific relation of two sentences and identifies denoted constructs. Correlate is called a placeholder at the syntactic level because it does not occupy its original topological fields in the syntactic structure. The correlate (es) or the prepositiona
... Show Moreيعد بيان التدفق النقدي من البيانات المهمة الصادرة من الوحدات الحكومية غير الهادفة للربح، بعد تبنيها معايير IPSASs ، مما يوفر معلومات اوسع تلبي حاجات المستخدمين لأتخاذ القرارات المناسبة . أذ يتضمن بيان التدفق النقدي بموجب المعيار رقم ( 2 ) التدفقات النقدية حسب الأنشطة التشغيلية و الاستثمارية والتمويلية ، وهذا لا ينسجم مع مخرجات النظام المحاسبي الحكومي العراقي . وان هدف البحث هو التعرف
... Show MoreThe study aimed at identifying the domains of abuse of the elderly (each field separately) of the research sample. The study sample consisted of (100) senior citizens residing in nursing homes in Baghdad and Kirkuk cities. They were selected in a simple random way. In order to achieve the research objectives, two scales were developed to measure the abuse of the elderly consisted of six domains: Neglection abuse, emotional abuse, physical abuse, social abuse, financial abuse, sexual abuse), and the other to measure the life review. The results showed that the level of abuse of older people in the sample is higher than the average in the society they belong to, the level of life review was higher than the average they belong to, and the a
... Show MoreAbstract
This paper discusses the essence of the developmental process in auditing firms and offices at the world today. This process is focused on how to adopt the audit concepts which is based on Information and Communication Technology (ICT), including the Continuous Auditing (CA) in particular. The purpose of this paper is to design a practical model for the adoption of CA and its requirements according to the Technology Acceptance Model (TAM). This model will serve as a road map for manage the change and development in the Iraqi auditing firms and offices. The paper uses the analytical approach in reaching to the target results. We design the logical and systematic relations between the nine variable
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreTeen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC
... Show MoreThe current research aims to measure Generalized Anxiety Disorder among students of the University of Sulaymaniyah / College of Basic Education, and to identify the significance of differences between sex, scientific specialization and age, and for that reason, the research sample of (102) male and female students was chosen in a random manner, and the researcher used the diagnostic criteria for the generalized anxiety disorder contained He mentioned it in the Statistical and Diagnostic Manual of Psychiatry, and the paragraphs of the scale were formulated according to those standards after they verify the conditions of honesty and consistency, and the use of appropriate statistical means. The results of the research indicated that genera
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show More
ملخص البحث:
ان الله تعالى هو الذي خلق جميع المخلوقات ، والذي بيده الموت والحياة وان كل هذه المخلوقات تحتاج الى اوامر ، وهذه الاوامر الالهية وجهها الله لعبادة بوساطة انبياءه ( عليهم السلام) فكانوا هم اول المستسلمين والمنقادين لأوامره ، فجاءت الآيات الكريمة مخاطبة للأنبياء واقوامهم بشكل عام ولنبينا محمد (r) بشكل خاص.
اما عن المضمون البحثي فقد جاءت مادته مقسمة الى ثل
... Show More