Preferred Language
Articles
/
jperc-322
The Effect of Driver and Posner Models in correcting Alternative Perceptions in Educational Psychology Material for the Students at the Institute of Fine Arts
...Show More Authors

To achieve the goals, the researcher followed the design of equal and   independent groups of partial control and post-test . The research has chosen the Institute of Fine Arts in the area Almansour area as deliberate sample where three sections of students have been chosen and the   number of students is (69) students. The researcher conducted equivalence in the variables (age, and IQ , and the overall rate for grade III). in diagnostic phase,  (21) concepts of alternative    image out of (46) concepts have been identified in addition to the goals of formulation of acquisition concepts according to the three processes (definition, discrimination and application). Achievement test has been conducted then after, Multiple choice consists of (63) points to make sure of the students to the concepts of alternative image. It was mad sure of the test sincerity, persistence and the coefficient of difficulty and the coefficient of indistinguishable. The test has been applied on Tuesday, 05.06.2014  where Analysis of variance and (Tukey) tests were used  as a statistical means for  research data treatment .  The following results have been obtained: -

1- The superiority of the first experimental group of students who studied     according to Driver model over control group of students who studied according to the traditional way in the post-test.

2- The superiority of the second experimental group of students who studied according to Posner model over the control group students who studied according to the traditional way in the post-test.

3- There, is no difference of statistical significance between the experimental group who studied according to Driver model and the student  who studied   according to Posner  model .

     In light of the research results, the researcher found a set of conclusions and recommendations and proposals.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Demand-Adapted Service Oriented Architecture Using Lego Model
...Show More Authors

Many developments happened in Service Oriented architecture models but with no details in its technology and requirement. This paper presents a new Service Oriented Architecture (SOA) to all Service Enterprise (SE) according to their demands. Therefore, the goal is to build a new complete architecture model for SOA methodologies according to current technology and business requirements that could be used in a real Enterprise environment. To do this, new types of services and new model called Lego Model are explained in details, and the results of the proposed architecture model in analyzed. Consequently, the complications are reduced to support business domains of enterprise and to start associating SOA methodologies in their corporate s

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Apr 24 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Very High Q-Factor Based On G-Shaped Resonator Type Metamaterial Absorber
...Show More Authors

High Q-factor based on absorption can be achieved by tuning (the reflection and the transition percentage). In this work, the simple design and simulated in S-band have been investigated. The simulation results of G-shape resonator are shown triple band of absorption peaks 60%, 91.5%, and 70.3%) at resonance frequency 2.7 GHz, 3.26 GHz, and 4.05 GHz respectively. The results exhibited very high of the Q-factor ( 271 ) at resonance frequency ( 3.26 GHz ).  The high Q-factor can be used to enhance the sensor sensing, narrowband band filter and  image sensing.

View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Plant Archives
Land cover change detection using satellite images based on modified spectral angle mapper method
...Show More Authors

This research depends on the relationship between the reflected spectrum, the nature of each target, area and the percentage of its presence with other targets in the unity of the target area. The changes occur in Land cover have been detected for different years using satellite images based on the Modified Spectral Angle Mapper (MSAM) processing, where Landsat satellite images are utilized using two software programming (MATLAB 7.11 and ERDAS imagine 2014). The proposed supervised classification method (MSAM) using a MATLAB program with supervised classification method (Maximum likelihood Classifier) by ERDAS imagine have been used to get farthest precise results and detect environmental changes for periods. Despite using two classificatio

... Show More
Scopus (2)
Scopus
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Engineering
Adding Cellulosic Ash to Composting Mix as a Soil Amendment
...Show More Authors

Solid waste generation and composition in Baghdad is typically affected by population growth, urbanization, improved economic conditions, changes in lifestyles and social and cultural habits.

A burning chamber was installed to burn cellulosic waste only. It was found that combustion reduced the original volume and weight of cellulosic waste by 97.4% and 85% respectively.

A batch composting study was performed to evaluate the feasibility of co-composting organic food waste with the cellulosic bottom ash in three different weight ratios (w/w) [95/5, 75/25, 50/50].

The composters were kept in controlled aerobic conditions for 7 days. Temperature, moisture, and pH were measured hourly as process succe

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 18 2022
Journal Name
Iraqi Journal Of Science
Image Encryption Based on Intelligent Session Mask Keys
...Show More Authors

The revolution of multimedia has been a driving force behind fast and secured data transmission techniques. The security of image information from unapproved access is imperative. Encryptions technique is used to transfer data, where each kind of data has its own special elements; thus various methods should to be used to conserve distributing the image. This paper produces image encryption improvements based on proposed an approach to generate efficient intelligent session (mask keys) based on investigates from the combination between robust feature for ECC algebra and construction level in Greedy Randomized Adaptive Search Procedure (GRASP) to produce durable symmetric session mask keys consist of ECC points. Symmetric behavior for ECC

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 30 2021
Journal Name
Iraqi Journal Of Science
N Sequence Prime Ideals
...Show More Authors

    In this paper, the concepts of -sequence prime ideal and -sequence quasi prime ideal are introduced. Some properties of such ideals are investigated. The relations between -sequence prime ideal and each of primary ideal, -prime ideal, quasi prime ideal, strongly irreducible ideal, and closed ideal, are studied. Also, the ideals of a principal ideal domain are classified into quasi prime ideals and -sequence quasi prime ideals.

View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
ON M- Hollow modules
...Show More Authors

Let R be associative ring with identity and M is a non- zero unitary left module over R. M is called M- hollow if every maximal submodule of M is small submodule of M. In this paper we study the properties of this kind of modules.

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Data Classification using Quantum Neural Network
...Show More Authors

In this paper, integrated quantum neural network (QNN), which is a class of feedforward

neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
College Of Islamic Sciences
Shariah ruling on advice
...Show More Authors

Abstract

Research title: The legal ruling of advice.

This research deals with the topic of advice, as the research included the following:

Preamble: I explained in it the meaning of advice in the Qur’an and Sunnah, and that what is meant by it is a good performance of the duty, then explaining its importance, importing it, and the difference between advice and what is similar to it, from enjoining good, denial, reproach and reprimand, backbiting and the will.

The first topic: It dealt with the ruling on advice, whether it is recommended or disliked, or forbidden, because what is meant by it is to give advice to others may be an obligation in kind, or it may be desirable or dislike

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref