Preferred Language
Articles
/
jperc-547
Effectiveness of enrichment activities through using software program for second graders in Conversation article
...Show More Authors

Today we are witnessing huge scientific and technical progress so we need more skills and methods of thinking that needs to be acquired by the teacher, as the importance of computers in education  there are  many teachers  suffering  of the difficulty in teaching for pupils . researchers tried to  find a good suitable way with the technological  interests for now which represent by  computer design software and the introduction of enrichment activities in the curriculum because it is one of a contemporary trends for the development of the Arabic language with various levels of education and knowing if this program has negative or positive impact.

So  researchers presented  the research  Effectiveness of enrichment activities  through using software program for second graders in Conversation article with null hypothesis  which research sample reached to (60) students in a intentional way distributed  into two groups    ( experimental group and the control group ) and the researchers used  anterior and posterior test , who prepared  the appropriate statistical means for research, results showed that there are presence of statistically significant differences between anterior and posterior test  in performance and achievement between the experimental group and the control group  that went to experimental group which has studied the use of a software program.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Nov 02 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Inducing the Health Promotion Model for Nursing Practice: Qualitative Study
...Show More Authors

Objective: To generate a model that conceptualizes the phenomenon of health promotion and its related factors.
Methodology: A grounded theory methodology is used as qualitative method to explore the health promotion as
phenomenon of interest and its other related factors from the perspectives of specialists in this field. The study is
carried out from January 2002 through September 2004. A sample of (20) specialists in health sciences are
selected and interviewed as experts in the area of health promotion. The investigators conducted intensive and
structured interviews with the specialists to collect the data. These interviews were transcribed verbatim,
analyzed and interpreted.
Results: Findings of the study indicat

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Design an Integral Sliding Mode Controller for a Nonlinear System
...Show More Authors

The goal of this paper is to design a robust controller for controlling a pendulum
system. The control of nonlinear systems is a common problem that is facing the researchers in control systems design. The Sliding Mode Controller (SMC) is the best solution for controlling a nonlinear system. The classical SMC consists from two phases. The first phase is the reaching phase and the second is the sliding phase. The SMC suffers from the chattering phenomenon which is considered as a severe problem and undesirable property. It is a zigzag motion along the switching surface. In this paper, the chattering is reduced by using a saturation function instead of sign function. In spite of SMC is a good method for controlling a nonlinear system b

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Wed Dec 01 2010
Journal Name
Iraqi Journal Of Physics
Partial Level Densities for Neutron Induced Pre-equilibrium Nuclear Reactions
...Show More Authors

The state and partial level densities were calculated using the corresponding formulas that are obtained in the frame work of the exciton model with equidistant spacing model (ESM) and non-ESM (NESM). Different corrections have been considered, which are obtained from other nuclear principles or models. These corrections are Pauli Exclusion Principle, surface effect, pairing effect, back shift due to shell effect and bound state effect . They are combined together in a composite formula with the intention to reach the final formula. One-component system at energies less than 100 MeV and mass number range (50-200) is assumed in the present work. It was found that Williams, plus spin formula is the most effective approach to the composite

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
2019 International Joint Conference On Neural Networks (ijcnn)
A Fast Feature Extraction Algorithm for Image and Video Processing
...Show More Authors

View Publication
Scopus (40)
Crossref (38)
Scopus Clarivate Crossref
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
New Approach for Solving Three Dimensional Space Partial Differential Equation
...Show More Authors

This paper presents a new transform method to solve partial differential equations, for finding suitable accurate solutions in a wider domain. It can be used to solve the problems without resorting to the frequency domain. The new transform is combined with the homotopy perturbation method in order to solve three dimensional second order partial differential equations with initial condition, and the convergence of the solution to the exact form is proved. The implementation of the suggested method demonstrates the usefulness in finding exact solutions. The practical implications show the effectiveness of approach and it is easily implemented in finding exact solutions.

       Finally, all algori

... Show More
View Publication Preview PDF
Scopus (23)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Sat Apr 05 2025
Journal Name
2025 Ieee 4th International Conference On Computing And Machine Intelligence (icmi)
From Pixels to Diagnosis: AI-Powered CNN for Pneumonia Detection
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
The Structural systems and expressional function for Airport Terminals' buildings
...Show More Authors

The research deals with the structures of the contemporary travelers' buildings in particular, and which is a functional complex installations where flexibility, technical and stereotypes play an important role as well as the human values These facilities must represent physiological and psychological comfort for travelers. TThose are facilities where architectural form plays a distinguished role in reversing the specialty and identity of the building. Hence the importance of the subject has been in forced, as a result for the need to study these facilities and to determine the impact and affects by the surrounding environment, to the extent of the urban, environmental, urban, social, and psychological levels. The importance of the resea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 21 2019
Journal Name
Journal Of Engineering
Simple 2D chaotic remapping scheme for securing optical communication networks
...Show More Authors

In this work, a simple and new method is proposed to simultaneously improve the physical layer security and the transmission performance of the optical orthogonal frequency division multiplexing system, by combining orthogonal frequency division multiplexing technique with chaotic theory principles. In the system, a 2-D chaotic map is employed. The introduced system replaces complex operations such as matrix multiplication with simple operations such as multiplexing and inverting. The system performance in terms of bit error rate (BER) and peak to average ratio (PAPR) is enhanced. The system is simulated using Optisystem15 with a MATLAB2016 and for different constellations. The simulation results showed that the  BE

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Dec 23 2025
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref