Preferred Language
Articles
/
jperc-467
The Effect of the Problem Based Learning on EFL Learners’ Achievement
...Show More Authors

The present study discusses the problem based learning in Iraqi classroom. This method aims to involve all learners in collaborative activities and it is learner-centered method. To fulfill the aims and verify the hypothesis which reads as follow” It is hypothesized that there is no statistically significant differences between the achievements of Experimental group and control group”. Thirty learners are selected to be the sample of present study.Mann-Whitney Test for two independent samples is used to analysis the results. The analysis shows that experimental group’s members who are taught according to problem based learning gets higher scores than the control group’s members who are taught according to traditional method. This means that problem based learning has positive effect on the learners’ achievement. In the light of the results, a number of conclusions, recommendations and suggestions are put forward.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 24 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Impact of service quality on University services Demand: Applied research at private Dijlah University
...Show More Authors

One of the most important problems that would continuously face the Higher  education  organizations is how to  improve the service level  presented by them, and how this can lead to increase demand for services of this organizations.As this issue has exhausted many organizations pushed some of them to withdraw from the market Because of weaknesses in their services. Here lies the importance of this matter to be given more attention in order to maintain the organization competitive position. According to that, The selection of the research title (The Impact of Quality on the Level of the University Service Request) which seeks to measure the impact of service quality on the level of demand, At a time when  world&

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Reflection of innovative marketing skills on the broad recommendation Survey Research at Asia Telecom- Iraq
...Show More Authors

The research aims at clarifying the relationship between innovative marketing skills and broad recommendation as a vital and important issue for organizations in general and service organizations in particular to demonstrate how innovative marketing skills contribute to broad adoption and to determine the relationship between interdependence and the impact of innovative marketing skills on the broad recommendation. Some questions are posed by the research problem. Is there a clear awareness among individuals in the company about the concept of marketing marketing skills and how do innovative marketing skills affect the broad recommendation of the surveyed company? How innovative marketing skills relate to the broad recommendation

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Environmental Taxes Effectiveness on controlling The Pollution reduction levels due To the Activity Contracted Foreign Oil Companies in Iraq: An applied research in the general commission of taxes
...Show More Authors

     Environmental Tax is deemed as one of the most important tools that can be used to eliminate the problem of oil –based  environment pollution resulted out of oil products processes and this has been significantly approved by the experience in those leading countries in the field of protecting the environment against pollution whereas oil-producing countries which are rather awkward in maintaining the environment such as Iraq , suffer from notorious environmental effects pertaining to oil product processes.

     The problem of the research is represented the increased and constant rise in the volume of the environmental pollutants resulted from the processes managed by the intern

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Achievement of Product Quality by Using Organizational Agility Case Study In Numan Public Company
...Show More Authors

Helps to use the mechanics of organizational agility in improving product quality by reducing waste or reduce it by removing activities that do not add value, which is the main reason for inefficiency and low productivity and increase costs, so the difficulty of changing administrative decisions to cope with internal and external changes to keep up with market trends renewable are the basic issue that research seeks to be addressed through the adoption of mechanisms of organizational agility, which will be reflected in bottom line in a positive way in improving the quality of products, and thus lies Applied important to look at the light of the results achieved and in which they can know the nature of the relationship between the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 01 2019
Journal Name
2019 2nd International Conference On Engineering Technology And Its Applications (iiceta)
Human Gait Identification System Based on Average Silhouette
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
View Publication
Crossref
Publication Date
Sat Jun 26 2021
Journal Name
2021 Ieee International Conference On Automatic Control & Intelligent Systems (i2cacis)
Vulnerability Assessment on Ethereum Based Smart Contract Applications
...Show More Authors

View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More