The research aims at identifyiny the effect of (Danials Model) in concepts Acquisition of Education Principles on Students at college at Education The total unmber of Students , is (65) male and female Students distributed in two groups . The First group is the experiemental group which is taught the (Danials Model) and is (34) Students . The second groupe is the control group which is taught the traditional method of teaching and it is (31) Students . The researcher has matcheol between the two groupe by the following variables : the age , (in monthes) their intelligence their parents a cademic leve of education . The research has constructed a test of (20) items of multiple choice test . The reliability of The test has been calculated and it is (0,84) After Processing The result Statistically loy The . T . Test , it has been show that There is a Statistically significance difference infavour to the experiemental group
The research explain the developments in the structure of government Expenditure for the period (1990-2014), this period include tow different periods in terms of the conditions, the first period (1990-2002)characterized by imposing the economic sanctions and deny the Iraqi economy from the oil revenues, while the second period (2003-2014) marked by abundance resource rents as a result of lifting the ban on oil exports, (autoregressive Distributed lag Model) has been used to measure the impact of government Expenditure in both side current and investment in the oil-GDP (gross domestic product) and non oil-GDP, the stady found that there is no significant relationship between current Expenditure in non-oil and oil-GDP in bo
... Show MoreThis paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra
... Show Moreهناك عوامل عديدة تؤثر في البنية الشكلية للم ا ركز الحضرية التي تشهد تحولات وبصورة مستمرة ومع
توسع المدينة ونموها تفقد هذه الم ا ركز لمقومات بنيتها الحضرية المتكاملة بسبب تلك التحولات الحاصلة
ضمنه وبصورة ديناميكية من اضافات وتغيرات في النمط الحضري الذي يتشكل من عدة نماذج معمارية
جديدة مؤثرة ولأجل ذلك جاء البحث لايضاح اثر هذه العلاقة بين النمط الحضري والنموذج المعماري
وتحولاته في تكاملية البنية ا
Pulsar stars divided into two types depending on the periods of rotation, normal
emission Pulsar and Millisecond pulsars (MSPs). In this paper, the effect of the
strong magnetic field on the thermal emission in Millisecond pulsar stars is
concentrated. Also the luminosity spin down (Lsp) are calculated depends on the
periods (P), and Period derivative (
P
) for sample stars which were adopted. The
relation between internal and surface magnetic field is illustrated. The model that
which adopted is Hallo Cone Model (HCM)). The total magnetic dipole radiation
power (heating power Wh) of all super fluid neutrons in MSPs stars is calculated.
For sample stars of MSPs , the value of transition period (Ptr) was d
In a recent study, a special type of plane overpartitions known as k-rowed plane overpartitions has been studied. The function denotes the number of plane overpartitions of n with a number of rows at most k. In this paper, we prove two identities modulo 8 and 16 for the plane overpartitions with at most two rows. We completely specify the modulo 8. Our technique is based on expanding each term of the infinite product of the generating function of the modulus 8 and 16 and in which the proofs of the key results are dominated by an intriguing relationship between the overpartitions and the sum of divisors, which reveals a considerable link among these functions modulo powers of 2.
In this paper, the construction of Hermite wavelets functions and their operational matrix of integration is presented. The Hermite wavelets method is applied to solve nth order Volterra integro diferential equations (VIDE) by expanding the unknown functions, as series in terms of Hermite wavelets with unknown coefficients. Finally, two examples are given
Social Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation. Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annota
... Show MoreThe study aimed at identifying the domains of abuse of the elderly (each field separately) of the research sample. The study sample consisted of (100) senior citizens residing in nursing homes in Baghdad and Kirkuk cities. They were selected in a simple random way. In order to achieve the research objectives, two scales were developed to measure the abuse of the elderly consisted of six domains: Neglection abuse, emotional abuse, physical abuse, social abuse, financial abuse, sexual abuse), and the other to measure the life review. The results showed that the level of abuse of older people in the sample is higher than the average in the society they belong to, the level of life review was higher than the average they belong to, and the a
... Show MoreThis paper proposes a new methodology for improving network security by introducing an optimised hybrid intrusion detection system (IDS) framework solution as a middle layer between the end devices. It considers the difficulty of updating databases to uncover new threats that plague firewalls and detection systems, in addition to big data challenges. The proposed framework introduces a supervised network IDS based on a deep learning technique of convolutional neural networks (CNN) using the UNSW-NB15 dataset. It implements recursive feature elimination (RFE) with extreme gradient boosting (XGB) to reduce resource and time consumption. Additionally, it reduces bias toward
... Show MoreIn this paper, the concepts of -sequence prime ideal and -sequence quasi prime ideal are introduced. Some properties of such ideals are investigated. The relations between -sequence prime ideal and each of primary ideal, -prime ideal, quasi prime ideal, strongly irreducible ideal, and closed ideal, are studied. Also, the ideals of a principal ideal domain are classified into quasi prime ideals and -sequence quasi prime ideals.