Preferred Language
Articles
/
jperc-547
Effectiveness of enrichment activities through using software program for second graders in Conversation article
...Show More Authors

Today we are witnessing huge scientific and technical progress so we need more skills and methods of thinking that needs to be acquired by the teacher, as the importance of computers in education  there are  many teachers  suffering  of the difficulty in teaching for pupils . researchers tried to  find a good suitable way with the technological  interests for now which represent by  computer design software and the introduction of enrichment activities in the curriculum because it is one of a contemporary trends for the development of the Arabic language with various levels of education and knowing if this program has negative or positive impact.

So  researchers presented  the research  Effectiveness of enrichment activities  through using software program for second graders in Conversation article with null hypothesis  which research sample reached to (60) students in a intentional way distributed  into two groups    ( experimental group and the control group ) and the researchers used  anterior and posterior test , who prepared  the appropriate statistical means for research, results showed that there are presence of statistically significant differences between anterior and posterior test  in performance and achievement between the experimental group and the control group  that went to experimental group which has studied the use of a software program.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Aug 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Text hiding in text using invisible character
...Show More Authors

Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Environmental study of groundwater in southwest of Baghdad, Yusufiyah using GIS
...Show More Authors

Ground water hydrochemical study in Yusufiyah depends upon (25) wells where major cations and anions were obtained as well as trace elements. The hydrochemical properties include the study of (pH, EC, TDS, and TH). The groundwater of the study area is odorless and colorless except the wells (13 and 16) with a salty taste due to the elevated (TDS) concentration in it, where the wells depth ranges between 7-20 meters. Depth of water in these wells was about 25-35 meters above sea level. Groundwater generally flows from east to west and from north east to south west. The resource of groundwater depends upon surface water. Physical specifications are measured in the water samples included temperature, color, taste, odor, pH, electrical condu

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Nov 12 2018
Journal Name
Arab Science Heritage Journal
الدولة الدولة عند الإمام أمير المؤمنين علي بن أبي طالب (عليه السلام)
...Show More Authors

Imam Amir al-Mu'minin Ali Bin Abi Taleb when he rebuild the Islamic State faced many challenges circumstances that disturbed the general life

View Publication Preview PDF
Publication Date
Tue Jul 01 2008
Journal Name
Journal Of Educational And Psychological Researches
آداب العالم والمتعلم عند الإمام علي بن أبي طالب - كرم الله وجهه -
...Show More Authors

أهمية البحث :-

 ان انبعاث هذه الامة من جديد لتعاود العطاء من معين النبوة ، ولتنقذ البشرية وتسهم ببناء الحضارة الانسانية، وتشارك في معالجة ازمة الحضارة المعاصرة سوف لايتاتى الا اذا كانت الامة في مستوى اسلامها كتاباً وسنة، وفي مستوى عصرها استيعاباً وتعليماً واعلاماً واتصالاً وحواراً ومشاركةً.

واذا كان انبعاث أي مجتمع مرهون بتوفير شروط وظروف الانبعاث الاولى، حيث لايصلح امر هذه الامة الا بما صلح

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 21 2022
Journal Name
Al-academy
معالجات تصفيف الشعر عند المرأة بين عصر فجر السلالات والعصر البابلي القديم
...Show More Authors
لوادي الرافدين مكانه عريقة بين باقي الدول العريقة الأخرى ويتميز في تطوره الحضاري في عدة مجالات وهذا أعطاه مكانه كبيرة بين الأمم الأخرى المجاورة حتى أصبح منبعا تنهل منه الأمم الأخرى المعرفة بكل جوانبها , وان دراسة الآثار الفنية القديمة تكشف لنا جانب من جوانب التاريخ الذي يعيننا على فهم حاضر الإنسان وكيف وصل إلى ما هو عليه. وتكشف لنا الأصول الأساسية لتراث البشرية منذ أقدم العصور, وكذلك تعد الآثار ا
... Show More
View Publication Preview PDF
Publication Date
Thu Dec 31 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
تطبيق برنامج مقترح لتدقيق عمليات استكشاف الموارد المعدنية وتقييمها على وفق متطلبات معيار الابلاغ المالي رقم (6)
...Show More Authors

Review of the research and the reality of the costs of the survey and exploration in the oil exploration company The study showed the effect of the application of standard financial reporting (6) "mineral resources exploration and evaluation" on the financial statements, have touched on a range of problems, the most important deficiencies in the disclosure of information relating to expenses of research and exploration that must be show Kmugod and which should be recognized as an expense in the financial statements of the company based on the international standard (6) for the purpose of knowing the financial situation of the company, and to find solutions presented researcher hypothesis is the following: that the Company's application s

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2009
Journal Name
Al-khwarizmi Engineering Journal
A Proposed Artificial Intelligence Algorithm for Assessing of Risk Priority for Medical Equipment in Iraqi Hospital
...Show More Authors

This paper presents a robust algorithm for the assessment of risk priority for medical equipment based on the calculation of static and dynamic risk factors and Kohnen Self Organization Maps (SOM). Four risk parameters have been calculated for 345 medical devices in two general hospitals in Baghdad. Static risk factor components (equipment function and physical risk) and dynamics risk components (maintenance requirements and risk points) have been calculated. These risk components are used as an input to the unsupervised Kohonen self organization maps. The accuracy of the network was found to be equal to 98% for the proposed system. We conclude that the proposed model gives fast and accurate assessment for risk priority and it works as p

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Eyewitnesses’ Visual Recollection in Suspect Identification by using Facial Appearance Model
...Show More Authors

Facial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sun Dec 31 2017
Journal Name
College Of Islamic Sciences
Rules for dealing with the offender in Islamic thought
...Show More Authors

Research summary

Today, the Islamic nation is going through a phase that is one of the most dangerous that it has never experienced before. This phase was characterized by the following:

The nation is divided into states and its weakness in most of its doctrinal, political, social, economic and moral aspects.
Enemies targeting the nation's faith and capabilities, and the emergence of loyalty to the enemies of the nation from some groups of society, spreading misconceptions in the Muslim community.
Spreading the spirit of rebellion in all segments of society and striving to stir up the people against the rulers and put pressure on the rulers.

All these manifestations and others require the nation's wise men

... Show More
View Publication Preview PDF