The aim of this study is to examine the effectiveness of fishbowl strategy as one of the effective learning strategies for intermediate students’ achievement in geography subject. To do this, three classes of second intermediate were chosen from Noor Al-Mustafa School for academic years (2015-2016). (64) Student were selected as a sample that distributed into two equal groups: experimental and control group. The research used the achievement test as an instrument to come up with the finding of the study. The experiment began on Tuesday 13th of October 2015 and ended on Tuesday 5th January 2016. Through this time, the researcher taught them the first and second chapter in geography of Arab homeland using fishbowl strategy for experimental group and traditional method for control group. The author utilized T-test, Chi-square, and Pearson correlation coefficient to get the results. The result revealed that there are statistically significant differences at the level of (0, 05) between the mean scores of achievement test which went to experimental group.
چکیدهی بحث
به نظر میآید که عالم هستی ، بر مسألهی « حرکت» استوار دارد ، و روح ، همیشه دنبال دگرگونی و تکامل و برتری میگردد. حرکت ، همهی چیزها در عالم إمکان را در بر میگیرد. حرکت در بنیادهای فکر مولانا جای مهمی دارد .اشعار مولانا مقدار زیادی از پویایی و حرکت برخوردارست، و از آنجایی که فعل ، عنصر تکانبخش جمله ، و کانون دلالت است ، ترجیح دادیم - علاوه بر دیگر عنا
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreCoaches and analysts face a significant challenge of inaccurate estimation when analyzing Men's 100 Meter Sprint Performance, particularly when there is limited data available. This necessitates the use of modern technologies to address the problem of inaccurate estimation. Unfortunately, current methods used to estimate Men's 100 Meter Sprint Performance indexes in Iraq are ineffective, highlighting the need to adopt new and advanced technologies that are fast, accurate, and flexible. Therefore, the objective of this study was to utilize an advanced method known as artificial neural networks to estimate four key indexes: Accelerate First of 10 meters, Speed Rate, Time First of 10 meters, and Reaction Time. The application of artifi
... Show MoreThis research highlights one of the most important issues that have been controversial between Islamic schools, which is the duality of Intellect and Revelation and the nature of their relationship, in two core points:
The first point: Could there be a real conflict between Intellect and revelation? While the school of hadith view that this assumption is a rational assumption that does not real as long as the revelation is correct and the Intellect is clear, and that what is claimed are due to other Intellect s, we find that the Ash’ari school adopts the saying that the real conflict may occur, but rather confirms its occurrence.
The second point: For whom is the priority, for the Intellect or th
... Show MoreIn this paper, the construction of Hermite wavelets functions and their operational matrix of integration is presented. The Hermite wavelets method is applied to solve nth order Volterra integro diferential equations (VIDE) by expanding the unknown functions, as series in terms of Hermite wavelets with unknown coefficients. Finally, two examples are given
The emergence of the Internet and its transformation in the early nineties of the last century led to a means of mass communication that brought about significant structural changes in the media map.
Over the course of historical development, the public did not engage the media in its behavior in the implementation and dissemination of an idea, generalization or theory put forward by media experts or practitioners through these means to do it. Blogs represent the most important service provided by the Internet in recent years which has gained special importance in the media field. Where the word “Blogs” has several names: (alternative media), (blogging press), (popular press) and other names.
The medi
... Show MoreIn this study, we attempt to provide healthcare service to the pilgrims. This study describes how a multimedia courseware can be used in making the pilgrims aware of the common diseases that are present in Saudi Arabia during the pilgrimage. The multimedia courseware will also be used in providing some information about the symptoms of these diseases, and how each of them can be treated. The multimedia courseware contains a virtual representation of a hospital, some videos of actual cases of patients, and authentic learning activities intended to enhance health competencies during the pilgrimage. An examination of the courseware was conducted so as to study the manner in which the elements of the courseware are applied in real-time learn
... Show MoreSocial Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation. Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annota
... Show Moreالكتابة عن الأندلس بعد تسليم مدينة غرناطة يحمل في ثناياه ألم كبير، لأن الأندلسيين عاشوا تجربة إنسانية قاسية سببها الأساس غياب التسامح الديني والعدالة الاجتماعية، الأمر الذي دفعهم للثورة مطالبين بحقوقهم التي نصت عليها معاهدة تسليم المدينة. فقد عاش أولئك حياة صعبة ، فكانوا صورة للصراع بين حضارتين الإسلامية والغربية ، ويمكن تلمس ذلك الصراع من خلال دراسة ثوراتهم ضد السلطة الحاكمة التي يبدو من تتبع أح
... Show More