Preferred Language
Articles
/
jperc-259
Affect of learning the bag in the acquisition of historical concepts for students in the fifth grade literary history
...Show More Authors

The  adopted method in the teaching of history is conservation and indoctrination in all grades, and this will lead to a lack of students interact with teachers in the course of the lesson, and poor use of teachers to questions that raise students' thinking during the lesson, which leads to a lack of interest in the topic of the lesson and wasting opportunities contribution making it the teacher at the center of the educational process, and to provide arrogating the researcher to contribute to teaching style with the belief that the use of this method of teaching could lead to overcome the difficulties and problems faced by the teaching material.

And there are educational complexes integrated approach in the Individualized Education provides learning material in an integrated manner, concise and clear and in raising motivation to learn because its objectives are clear and specific, and provide opportunities to interact with the learner, as it regulates the educational activity in an entertaining way and with high flexibility and walking with the learner step by step, as well as provides opportunities for self-learners to grow and learn according to individual criteria 0, and then he avoids the deadlock in the traditional methods and programs because they are designed and modify and adapt the confrontation of the individual needs of the learner and allow the diversity of teaching methods at the same time

Aim of the research: The current research aims to identify:

Affect of learning the bag in the acquisition of historical concepts for students in the fifth grade literary history

boundaries: is determined by the current Search by

- Students fifth grade secondary (literary)

- History book scheduled to fifth grade secondary (literary)

 Chapter II of Arabic studies and foreign

Studies on educational bag in the acquisition of historical concepts

Chapter III experimental design: researcher determined experimentally adopted a two experimental and control group

Rewarded researcher (b chronological age of the requests measured in months, students in grades prior knowledge test, IQ test scores)

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 23 2018
Journal Name
Journal Of Economics And Administrative Sciences
استعمال انحدار الاسقاطات المتلاحقة و الشبكات العصبية في تجاوز مشكلة البعدية
...Show More Authors

المستخلص يهدف هذا البحث الى تجاوز مشكلة البعدية من خلال طرائق الانحدار اللامعلمي والتي تعمل على تقليل جذر متوسط الخطأ التربيعي (RMSE) , أذ تم  استعمال طريقة انحدار الاسقاطات المتلاحقة  (PPR)    ,والتي تعتبر احدى طرائق اختزال الابعاد التي تعمل على تجاوز مشكلة البعدية (curse of dimensionality) , وان طريقة (PPR) من التقنيات الاحصائية التي تهتم بأيجاد الاسقاطات الاكثر أهمية في البيانات المتعددة الابعاد , ومع ايجاد كل اسقاط

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Feb 25 2019
Journal Name
Iraqi Journal Of Physics
Relationship between CML and Io's phase according to Jupiter's actual radio storms observations
...Show More Authors

The actual observations for Jupiter radio storm were taken for Hawaii station within multi years from 2001 to 2012. The Central Meridian Longitude (CMLІІІ) and Io's phase (γIo) were calculated for each year from Radio Jove program, the results of CMLІІІ for year 2006 was A=(180-300)º,B=(15-239)º, C=(60-280)º, phase was A=(182-260)º,B=(40-109)º, C=(200-260)º, which were close to the theoretical values, longitude was A=(180-300)º, B=(15-240)º, C=(60-280)º and phase was A=(180-260)º,B=(40-110)º and C=(200-260)º.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Aug 03 2023
Journal Name
Journal Of Legal Sciences
Rooting Governance and its Legal Nature
...Show More Authors

Tax governance is a set of legal means that directs the tax administration to deal in good faith with taxpayers based on transparency, integrity and accountability while ensuring the achievement of tax justice and works to introduce advanced means by which it deals with all stakeholders.

      In this study, we try to explain its rooting and legal nature by shedding light on the position of some international organizations and their internal legislation in the context of public finance.

View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Engineering
An Electronic and Web-Based Authentication, Identification, and Logging Management System
...Show More Authors

The need for participants’ performance assessments in academia and industry has been a growing concern. It has attendance, among other metrics, is a key factor in engendering a holistic approach to decision-making. For institutions or organizations where managing people is an important yet challenging task, attendance tracking and management could be employed to improve this seemingly time-consuming process while keeping an accurate attendance record. The manual/quasi-analog approach of taking attendance in some institutions could be unreliable and inefficient, leading to inaccurate computation of attendance rates and data loss. This work, therefore, proposes a system that employs embedded technology and a biometric/ w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 20 2024
Journal Name
Fizjoterapia Polska
Development Artificial Neural Network (ANN) computing model to analyses men's 100¬meter sprint performance trends
...Show More Authors

Coaches and analysts face a significant challenge of inaccurate estimation when analyzing Men's 100 Meter Sprint Performance, particularly when there is limited data available. This necessitates the use of modern technologies to address the problem of inaccurate estimation. Unfortunately, current methods used to estimate Men's 100 Meter Sprint Performance indexes in Iraq are ineffective, highlighting the need to adopt new and advanced technologies that are fast, accurate, and flexible. Therefore, the objective of this study was to utilize an advanced method known as artificial neural networks to estimate four key indexes: Accelerate First of 10 meters, Speed Rate, Time First of 10 meters, and Reaction Time. The application of artifi

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
حوليات أداب عين شمس
المنظور الزمني وعلاقته بجودة الحياة الاكاديمية لدى طلبة جامعة بغداد
...Show More Authors

Abstract The aim of the current research is to identify the time perspective and the quality of academic life of Baghdad University students. The research also aims to identify the relationship between the time perspective and the academic quality of Baghdad University students and the extent to which the time perspective dimension of academic quality contributes to the identification of the difference between the time perspectives in terms of gender. Finally, the research aims to identify if there is a significant difference in the quality of academic life between males and females. The scales were applied to a number of (434) university male and female student. A one-sample t-test, a two-sample t-test, the analysis of the variation, the P

... Show More
View Publication
Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
المحددات الاقتصادية والاجتماعية للبطالة في السودان -دراسة قياسية باستخدام انحدار المركبات الرئيسة للمدة (1981-2015م)
...Show More Authors

Considering the magnitude of its economic, social and political impact, unemployment represents a crucial challenge confronting the majority of the countries of the world. The problem of the study was the high rates of unemployment in Sudan and the inability of economic growth rates to keep pace with the steady increases in unemployment rates during the study period. This study aimed to identify the economic and social variables influencing unemployment rate in Sudan, in addition to measuring the impact of these variables over the period (1981-2015). Data were collected from databases of the World Bank and Atlas of the World's data .The study hypothesized the presence of statistically significant and direct relationship between u

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref