Preferred Language
Articles
/
jperc-517
Following model educational offenders in collection and Alasbaka of fifth grade students preparatory in history
...Show More Authors

Following model educational offenders in collection and Alasbaka of fifth grade students preparatory in history A. M. Dr Prepared by: Dr. Bashaer Mawloud Tawfeeq, The Center of Educational and Psychological Studies Baghdad University - There is no difference statistically significant at the 0.05 level of significance between the average scores of the following students studying using model and offenders and who are studying in the usual manner (traditional) in the collection - There is no difference statistically significant at the 0.05 level of significance between the mean scores for the following students studying using model and offenders and who are studying in the usual manner (traditional) in retention Find limits: Current search is determined by students fifth grade preparatory (literary) in day secondary schools in the province of Baghdad Center Determine the terms of the survey model and offenders, collection, retention Chapter II Previous studies have addressed the model and offenders with the collection and retention Chapter III First: the experimental design: the researcher adopted experimentally determined The two experimental groups and a control group and achievement test after me Second: The students preparatory fifth (literary) in day secondary schools in Baghdad city center / for the academic year 2012-2013 Third: distributed randomly on the two sets of people search to the first representation of the experimental group (Division) Division represents the control group. The number of female students after Astied the female students Alraspat to the previous year Researcher rewarded variables (degrees of history, intelligence test, the previous information in history Researcher drafted (35) behaviorally goal depending on the general goals and content-delivery history topics examined in the experiment spread over the first three levels of the cognitive domain of Bloom's Taxonomy (knowledge, comprehension, application) Researcher prepared a test to measure the achievement of Formation (35) paragraph of multiple-choice, the researcher used a number of means, including statistical (ANOVA, difficult equation and excellence paragraph, the Pearson correlation coefficient, Spearman equation - Brown Chapter IV Presented in this chapter researcher's findings in accordance with the goal of research and hypotheses (rejected hypotheses and the results showed that there were statistically significant differences between the scores of the two students Conclusions In light of the findings of current research can be concluded as follows: Preference model Janneh on the usual way of teaching history at the fifth grade students preparatory and which was reflected by raising level mode and retention of information Recommendations: In light of the findings and conclusions reached by the researcher can go out the following recommendations: - Emphasis on the educational model Janneh in the teaching of history in middle school because of its role in achieving the objectives of teaching history to raise the level of the collection and retention of information Numbers of teachers, which makes them able to teach according to modern models in the teaching of history Proposals : An update of the current research suggests the researcher conducting the following studies A similar study of the current study in another subsidiary variables such as critical thinking or direction towards the article,Following model educational offenders in collection and Alasbaka of fifth grade students preparatory in history

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 26 2017
Journal Name
Al-khwarizmi Engineering Journal
Fuzzy Wavenet (FWN) classifier for medical images
...Show More Authors

 

    The combination of wavelet theory and neural networks has lead to the development of wavelet networks. Wavelet networks are feed-forward neural networks using wavelets as activation function. Wavelets networks have been used in classification and identification problems with some success.

  In this work we proposed a fuzzy wavenet network (FWN), which learns by common back-propagation algorithm to classify medical images. The library of medical image has been analyzed, first. Second, Two experimental tables’ rules provide an excellent opportunity to test the ability of fuzzy wavenet network due to the high level of information variability often experienced with this type of images.

&n

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
ON M- Hollow modules
...Show More Authors

Let R be associative ring with identity and M is a non- zero unitary left module over R. M is called M- hollow if every maximal submodule of M is small submodule of M. In this paper we study the properties of this kind of modules.

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Data Classification using Quantum Neural Network
...Show More Authors

In this paper, integrated quantum neural network (QNN), which is a class of feedforward

neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
College Of Islamic Sciences
Shariah ruling on advice
...Show More Authors

Abstract

Research title: The legal ruling of advice.

This research deals with the topic of advice, as the research included the following:

Preamble: I explained in it the meaning of advice in the Qur’an and Sunnah, and that what is meant by it is a good performance of the duty, then explaining its importance, importing it, and the difference between advice and what is similar to it, from enjoining good, denial, reproach and reprimand, backbiting and the will.

The first topic: It dealt with the ruling on advice, whether it is recommended or disliked, or forbidden, because what is meant by it is to give advice to others may be an obligation in kind, or it may be desirable or dislike

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 17 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Dynamic Channel Assignment Using Neural Networks
...Show More Authors

This paper presents a proposed neural network algorithm to solve the shortest path problem (SPP) for communication routing. The solution extends the traditional recurrent Hopfield architecture introducing the optimal routing for any request by choosing single and multi link path node-to-node traffic to minimize the loss. This suggested neural network algorithm implemented by using 20-nodes network example. The result shows that a clear convergence can be achieved by 95% valid convergence (about 361 optimal routes from 380-pairs). Additionally computation performance is also mentioned at the expense of slightly worse results.

View Publication Preview PDF
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
S-Coprime Submodules
...Show More Authors

  In this paper, we introduce and study the concept of S-coprime submodules, where a proper submodule N of an R-module M is called S-coprime submodule if M N is S-coprime Rmodule. Many properties about this concept are investigated.

View Publication Preview PDF
Publication Date
Thu Dec 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Modules with Chain Conditions on S-Closed Submodules
...Show More Authors

  Let L be a commutative ring with identity and let W be a unitary left L- module. A submodule D of an L- module W is called  s- closed submodule denoted by  D ≤sc W, if D has   no  proper s- essential extension in W, that is , whenever D ≤ W such that D ≤se H≤ W, then D = H. In  this  paper,  we study  modules which satisfies  the ascending chain  conditions (ACC) and descending chain conditions (DCC) on this kind of submodules.

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Baghdad Science Journal
Notes on Approximately Pure Submodules
...Show More Authors

Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be approximately pure submodule of an R-module, if for each ideal I of R. The main purpose of this paper is to study the properties of the following concepts: approximately pure essentialsubmodules, approximately pure closedsubmodules and relative approximately pure complement submodules. We prove that: when an R-module M is an approximately purely extending modules and N be Ap-puresubmodulein M, if M has the Ap-pure intersection property then N is Ap purely extending.

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
F-Compact operator on probabilistic Hilbert space
...Show More Authors

This paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.

View Publication Preview PDF
Crossref