Preferred Language
Articles
/
jperc-340
فاعلية برنامج GeoGebra في التحصيل وعادات العقل لدى طالبات الصف الثاني متوسط في الرياضيات
...Show More Authors

This study aims to find the effectiveness of GeoGebra software in the achievement and habits of mind of eighth grade female students.

The research sample consisted of (62) students and divided into two groups.  The first one is the experimental group (35 students) and it was taught using GeoGebra software, and the second group is the standard group (27 students) and it was taught using the traditional method of teaching. Two multiple-choice-question tests were prepared, one of them tests the achievement (40 paragraphs) and the other tests the habits of mind (24 paragraphs) and comprises four habits of mind according to Costa and Kallick classification, which are (Thinking flexibly, Thinking interdependently, Thinking about thinking, and Applying past knowledge). Psychometric characteristics of both tests were validated and appropriate statistical means were used. The results showed the superiority of the experimental group in the achievement and habits of mind tests compared to the control group.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
The Influence of Rewards on Games Flow, Challenge, and Its Effects Towards the Engagement of Malaysian Digital Traditional Games
...Show More Authors

Games engagement has become one of the main concerns in game industry. Early study revealed that Malaysian digital traditional games are suffering with the same issue due to several factors. One of it is the lack of the game itself. Although many Malaysian traditional games have been digitized, none of them has incorporated rewards despite its importance in games engagement. Realizing the importance of rewards in games engagement, one of Malaysian traditional Congkak has been chosen to be enhanced by incorporating rewards. Experiments have been conducted among 50 gamers among the Millennials. Prior interview, game demo and human test are conducted. Experiments focused on the influence of rewards on games flow, games challenge, and its ef

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
The predictive capacity of Coronavirus Impacts with Psychological Adjustment among University Students in Oman
...Show More Authors

The present study was designed to determine the predictive capacity of Coronavirus’s impact, as well as, the psychological adjustment among university students in Oman. A total of (566) male and female students were employed to form the swtudy sample. The descriptive method was used. The findings showed that there is a significantly university student affected by Coronavirus; the dimensions of scale were arranged as follows: the Academic requirements of pandemic came first, the social communication came second, and the academic future stress came in third. The results also showed that Psychological Adjustment among University Students was affected by the Coronavirus pandemic, the average was low. Also, the result showed that the Corona

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of The College Of Languages (jcl)
An excerpt on the analysis of correlate constructions: Exkurs zur Analyse der Korrelatkonstruktionen
...Show More Authors

The main idea that led me to write such research paper within the framework of Germanic linguistics is that I have not found any topic dealing with the term correlate in the German language, except in several articles in linguistic journals as well as one topic in a book describing the use of such a linguistic phenomenon in the language system. The research initially deals with the definition of the correlate at the level of the German language system. Correlate is unity describes specific relation of two sentences and identifies denoted constructs. Correlate is called a placeholder at the syntactic level because it does not occupy its original topological fields in the syntactic structure. The correlate (es) or the prepositiona

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
" أنعكاس تبني المعيار المحاسبي الدولي رقم ( 2 ) للقطاع العام على بيان التدفق النقدي "
...Show More Authors

يعد بيان التدفق النقدي من البيانات المهمة الصادرة من الوحدات الحكومية غير الهادفة للربح، بعد تبنيها معايير IPSASs ، مما يوفر معلومات اوسع تلبي حاجات المستخدمين لأتخاذ القرارات المناسبة . أذ يتضمن بيان التدفق النقدي بموجب المعيار رقم ( 2 ) التدفقات النقدية حسب الأنشطة التشغيلية و الاستثمارية والتمويلية ، وهذا لا ينسجم مع مخرجات النظام المحاسبي الحكومي العراقي . وان هدف البحث هو  التعرف

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
PROJECT MANAGEMENT OF BALAD`S MAJOR SEWERAGE SYSTEM BY USING THE GOAL PROGRAMMING METHOD
...Show More Authors

Abstract

          The project of balad's major sewerage system is one of the biggest projects who is still in progress in salahulddin province provincial - development plan that was approved in 2013 . This project works in two parts ; the 1st is installing the sewerage networks (both of heavy sewerage & rain sewerage) and the 2nd is installing the     life – off units (for heavy sewerage & rain sewerage , as well) . the directorate of salahuiddin is aiming that at end of construction it will be able to provide services for four residential quarters , one of the main challenges that project's  management  experience is how to achieve thes

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
Abuse elder and relationship life review
...Show More Authors

The study aimed at identifying the domains of abuse of the elderly (each field separately) of the research sample. The study sample consisted of (100) senior citizens residing in nursing homes in Baghdad and Kirkuk cities. They were selected in a simple random way. In order to achieve the research objectives, two scales were developed to measure the abuse of the elderly consisted of six domains: Neglection abuse, emotional abuse, physical abuse, social abuse, financial abuse, sexual abuse), and the other to measure the life review. The results showed that the level of abuse of older people in the sample is higher than the average in the society they belong to, the level of life review was higher than the average they belong to, and the a

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Teen-Computer Interaction: Building a Conceptual Model with Thoughts- Emotion-Behaviour
...Show More Authors

Teen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref