Preferred Language
Articles
/
jperc-421
اثر طريقة الملاحظات الصفية باستخدام الحاسوب( كمنشطات عقلية) في التحصيل الدراسي لمادة الفيزياء لدى طالبات الصف الأول المتوسط
...Show More Authors

The research aim to know the effect of note–taking by computer method as amentalactivators in achievement of physics subject for the first intermediate class students.

To investigate from aim of the research the research sample was chosen from the first intermediate class students in Al–mutamyzat secondary school for girls. Which belongs to the general administration for the second karkh education which randomly chosen from (9) schools for distinct female students in Baghdad. Then randomly chosen two sections form three about (80) female students at (66.667%) from total sample it’s about (120) female student in the three sections. The randomly chosen too, section (a) to represent experimental group it’s about (41) female students at (34.167%) and the section (g) represent the control group it’s about (39) female students at (32.5%) from the research society then the experimental and control groups design with apost–test was chosen the two groups have been equalization in the two variables that is (the female students g achievement in physics and mathematics subjects for mid year) and in another variable swhich effect on rocedure of the research. Then the experimental group female students was teaching by using note–taking by computer method as mentalactivators but the control female students was teaching by traditional method for physics subject before that the researcher put the special aim sand the behavior objectives in the light of bloom classification and she makes the teaching plane swhich was exposing them of specialists in physics and its teaching methods to ascertain from their validity for application. Then the esearcher prepared an achievement post-test which kind multiple–hoice with three chosen depend on the physics subjects include (38) items in the light of bloom classification by remember, understanding, and application level. It’s by using half–spilt method and the persone quation the reliability was (0.75) and correct that by using spearman–brown equation (r21) it was (0.85) the experiment was conducted in these condterm of the academic year (2012–2013). The data were statistically processed by using t-test formula for two

Unequal independent samples then the stand by hypothesis was accepted that’s there is statistic significant difference at (0.05) level between two averages for the female students which studied by using note–taking by computer method and for the female student which studied by using the traditional method in achievement for physics subject for the first intermediate class.

Then in the light of the research results the researcher commended the education mainstay and higher teaching mainstay to adoption for the note–taking by computer method to training the physics teacher to use it in their teaching and include it in the decision of the curriculum and the researcher suggested to makes imilar studies in several subjects and the stages of study to know it effect in achievement end another variables.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
On Comparison Study between Double Sumudu and Elzaki Linear Transforms Method for Solving Fractional Partial Differential Equations
...Show More Authors

        In this paper, double Sumudu and double Elzaki transforms methods are used to compute the numerical solutions for some types of fractional order partial differential equations with constant coefficients and explaining the efficiently of the method by illustrating some numerical examples that are computed by using  Mathcad 15.and graphic in Matlab R2015a.

View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
Geolocation Android Mobile Phones Using GSM/UMTS
...Show More Authors

The proliferation of cellular network enabled users through various positioning tools to track locations, location information is being continuously captured from mobile phones, created a prototype that enables detected location based on using the two invariant models for Global Systems for Mobile (GSM) and Universal Mobile Telecommunications System (UMTS). The smartphone application on an Android platform applies the location sensing run as a background process and the localization method is based on cell phones. The proposed application is associated with remote server and used to track a smartphone without permissions and internet. Mobile stored data location information in the database (SQLite), then transfer it into location AP

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Wear Behavior Performance of Polymeric Matrix Composites Using Taguchi Experiments
...Show More Authors

This research estimates the effect of independent factors like filler  (3%, 6%, 9%, 11% weight fraction), normal load (5N, 10N, 15N), and time sliding (5,7 , 9 minutes) on wear behavior of unsaturated polyester resin reinforced with jute fiber and waste eggshell and, rice husk powder composites by utilizing a statistical approach. The specimens polymeric composite prepared from resin unsaturated polyester filled with (4% weight fraction) jute fiber, and (3%, 6%, 9%, 11% weight fraction) eggshell, and rice husk by utilizing (hand lay-up) molding. Dry sliding wear experiments were carried utilizing a standard (pin on disc test setup) following a well designed empirical schedule that depends on Taguchi’s experimental design L9 (MINIT

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (5)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
Self-Regulation of University Students
...Show More Authors

The current research aims to identify the self-regulation of university students, as well as to identify the significance of the difference in self-regulation according to the variable of sex (male-female), specialization (scientific-human), and grade (first-fourth). To achieve the research objectives, the two researchers developed a scale of (28) items about self-regulation According to the theory of (Pandora, 1991). The scale was administered to (500) students from the first and fourth stages of Al -Mustansiriyah University who were selected based on the random stratification method for the 2020/2021 academic year. The results showed that university students have a good level of self-regulation. There are no significant differences in

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
L'obsession de la mort chez le petit Poulou
...Show More Authors

Writing his own biography is like making his confession in front of the altar of the truth. In The words,Sartre writes his own child life from the view of a philosopher-thinker. He presents his days spent justlike a series of images carrying advices and experiencesto whole the world. The words shows the life of a small orphan who met early with death when he lost his father. Then death becomes as his shadow that goes with him on day and night until the end. The mother of the little Poulou seems like the mirror that reflects the sadness and the melancholy of the dark and gloomy days. The small Poulou becomes his only consolation in misery. The little Jean -Paul lives completely in a literary atmosphere . Because his grandfather Karl Schwe

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The Musical Intelligence in kindergarten children
...Show More Authors

The childhood of the important stages in which the adopted child's personality, mental and physical, motor and configure , as well as gain experience , it is the basis on which the future life of the child , studies have unanimously competent in the fields of childhood verily the first five years of a child of the most important stages of life and the most fertile life . Because the stage Childhood its an active role as the foundation upon which to build human personality , it was necessary to create all leads to raise the level of intelligence of children , because intelligence is the first element in the organization of thinking makes the child able to do the activities characterized by mental qualities .
Indicated most of the scien

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 06 2013
Journal Name
Journal Of Educational And Psychological Researches
التمرد النفسي لدى طلبة الجامعة
...Show More Authors

Current search targeted to:
  1 - Measuring the psychological rebellion among the students of the university.
  2 - Identify the significant differences in the degrees of psychological rebellion among members of the sample according to the variables of sex (male - female), specialty (Science - a human).
      To achieve the objectives of the research chose researcher samples from the community of the first search for statistical analysis, has reached 400 students, and the second sample of the application of the final, has reached (480) students were selected randomly with simple check of equal value, and the researcher building a search tool double think, After the comple

... Show More
View Publication Preview PDF