The goal of this research to identify the effect of the probing questions in the collection of material literature with students of the Kurdish language department, to achieve the aim of the research, the researcher has chosen a sample from the students of third stage of the Kurdish language Department, Faculty of Education / Ibn Rushd as a field for the application of experiment.The number of sample reached (71) students divided into two groups represented two divisions of the experimental groups under study to the style of questions sounding by (35) students, and represented the other division of the control group, which studied in the way normal and by (36) students, as rewarded researcher between the two groups Search in academic achievement for parents variable, and the variable intelligence, and the final grades in the subject of Kurdish literature for the second phase of the academic year 2013-2014, and took the probationary period of two months, the researcher developed a test component of (20) items to choose the type of multi-has been characterized by honesty and consistency mediated It was (0,78), and when analyzing the results statistically using samples t-test (T- Test) for two independent samples show that there are differences animate statistically significant in favor of the experimental group that studied the literature on substance according to the method of sounding questions on the control group which studied according to the usual way.
Every finite dimensional normed algebra is isomorphic to the finite direct product of or , it is also proved these algebras are ultrasemiprime algebras. In this paper, the ultrasemiprime proof of the finite direct product of and is generalized to the finite direct product of any ultrasemiprime algebras.
Pulsar stars divided into two types depending on the periods of rotation, normal
emission Pulsar and Millisecond pulsars (MSPs). In this paper, the effect of the
strong magnetic field on the thermal emission in Millisecond pulsar stars is
concentrated. Also the luminosity spin down (Lsp) are calculated depends on the
periods (P), and Period derivative (
P
) for sample stars which were adopted. The
relation between internal and surface magnetic field is illustrated. The model that
which adopted is Hallo Cone Model (HCM)). The total magnetic dipole radiation
power (heating power Wh) of all super fluid neutrons in MSPs stars is calculated.
For sample stars of MSPs , the value of transition period (Ptr) was d
In this study, we attempt to provide healthcare service to the pilgrims. This study describes how a multimedia courseware can be used in making the pilgrims aware of the common diseases that are present in Saudi Arabia during the pilgrimage. The multimedia courseware will also be used in providing some information about the symptoms of these diseases, and how each of them can be treated. The multimedia courseware contains a virtual representation of a hospital, some videos of actual cases of patients, and authentic learning activities intended to enhance health competencies during the pilgrimage. An examination of the courseware was conducted so as to study the manner in which the elements of the courseware are applied in real-time learn
... Show MoreIn a recent study, a special type of plane overpartitions known as k-rowed plane overpartitions has been studied. The function denotes the number of plane overpartitions of n with a number of rows at most k. In this paper, we prove two identities modulo 8 and 16 for the plane overpartitions with at most two rows. We completely specify the modulo 8. Our technique is based on expanding each term of the infinite product of the generating function of the modulus 8 and 16 and in which the proofs of the key results are dominated by an intriguing relationship between the overpartitions and the sum of divisors, which reveals a considerable link among these functions modulo powers of 2.
Social Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation. Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annota
... Show MoreThe study aimed at identifying the domains of abuse of the elderly (each field separately) of the research sample. The study sample consisted of (100) senior citizens residing in nursing homes in Baghdad and Kirkuk cities. They were selected in a simple random way. In order to achieve the research objectives, two scales were developed to measure the abuse of the elderly consisted of six domains: Neglection abuse, emotional abuse, physical abuse, social abuse, financial abuse, sexual abuse), and the other to measure the life review. The results showed that the level of abuse of older people in the sample is higher than the average in the society they belong to, the level of life review was higher than the average they belong to, and the a
... Show MoreIn this paper, the concepts of -sequence prime ideal and -sequence quasi prime ideal are introduced. Some properties of such ideals are investigated. The relations between -sequence prime ideal and each of primary ideal, -prime ideal, quasi prime ideal, strongly irreducible ideal, and closed ideal, are studied. Also, the ideals of a principal ideal domain are classified into quasi prime ideals and -sequence quasi prime ideals.
The growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreAfrican-American writers during the 19th century wrote in the shadow of the prominent romance, sentimental, and domestic fiction. Harriet Wilson’s Our Nig (1859) reflects an “alternative social character”, for the female protagonist suffers racism in the free North, because she is a mulatto child. Through depicting the life of free blacks, who supposedly lives a better life than Southern slaves, Wilson exposes how she has actually lived and sensed life in antebellum America. According to Raymond Williams (2011), there are two kinds of literary writings. The first represents the general tendency of the age, and he calls it “dominant social character”; representing the majority content of both the public writing and speaking. But, a
... Show More