The aim of research is to identify the effect of using Waks strategy upon acquiring the psychological concepts and mind habits for students in the college of education. An experimental design with a partial adjustment of two experimental and control groups as well as a posttest were employed. The researcher divided the study sample into two groups: group one consisted of (38) students to represent the experimental group that was taught according to the waks strategy, and group two consisted of (35) students to represent the control group that was taught according to the traditional method. The sample was chosen based on some variables namely (Intelligence, Prior knowledge). The researcher has designed the research tools as the test of acquisition of psychological concepts, and mind habits scale, which were proved their validity and reliability. The results showed a superiority of the experimental group in the acquisition of Psychological Concepts.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreThe present work folds two qualitative objectives; the first focuses on investigating the multiplicity of motivation-based human needs in Little Bee. The second objective involves examining the linguistic forms adopted to disclose such needs. Consequently, the researchers are to adapt eclectically Alderfer's Existence, Relatedness, and Growth Theory (1969) and Langacker’s theory of Domains (1987) together with his Active Zone Operation (1991). Such a study helps to embody the connectivity between the social and psychological aspects, and the way these two aspects are disclosed using particular linguistic The study has concluded that Bee needed Alderfer’s basic human needs: existence, relatedness, and growth. Besides, satisfying
... Show Moreتتطلب عملية التنمية الاقتصـادية في الدول النامية مبالغ كبيرة من رؤوس الأمـوال اللازمة لتنفيذ البرامج والخطط الاقتصادية، ولما كانت الاسـتثمارات التي تنفذها هذه الدول خلال حقبة معينة، تزيد على ما تم تحقيقه من موارد مالية محلية، فلابد أنْ يمول الفرق من خلال انسياب صافٍ لرأس المال الأجنبي (قروض ومساعدات) إلى الداخل خلال المدة نفسها، لغـرض سَدّ الفجوة في المـوارد المحلية المعدة للاسـتثمار، وعانت بعض د
... Show MoreSocial media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acq
... Show MoreThe weakness of the central rule at the reign of Shah Sultan Hussain who is regarded as the last Shah who governed the Safawi state near to its falling at the hold of Afghan in 1722 which is the main and the real factor for the economic collapse. The tribes of trade have faced stealing and robbery actions which have been compressed to a very big extent. This action was not the responsibility of Shah alone,
The researcher tried to show the importance of using environmental taxes as an effective economic factor for reducing contaminators resulting from cars exhausts, and presenting a suggested pattern for environmental taxes as a nucleus and a starting point for a wider implementing of environmental taxes in Iraq. &nbs
... Show Moreي لا ماق ثحبلا فادهأ قيقحتلو ثحبلا ةنيعل نايبتسا ءارجاو فراصملل ةيلاملا مئاوقلا ليلحتب ثحاب اهمهأ ناك تاجاتنتسا ىلإ ثحابلا لصوت دقو لإ صاخ معد دوجو مدع نم ةيفرصملا رطاخملا ةراد ةروصب اهدوجو مدعو فراصملل ةماعلا تارادلاا يف اهدوجو رصتقي ثيح ،ايلعلا تاهجلا لبق نم ديزي امم ،عورفلا يف ةلاعف مدع ةجيتن عورفلا نم ةدلوتملاو فراصملا اههجاوت يتلا رطاخملا اهمهأ ناك تايصوت ىلإ ثحابلا لصوت دقو امك ،ةيفرصملا تلاماعم
... Show Moreالملخص: تعد عناصر اللياقة البدنية العمود الفقري للألعاب الرياضية وخصوصا في الالعاب الجماعية ومنها لعبة كرة القدم للصالات والتي تعد من الالعاب الرياضية التي تتطلب بذل جهود كبيرة خلال المنافسة نظرا لطبيعة الاداء الذي يمتاز بالقوة والسرعة طيلة شوطي المباراة وهذا يتطلب من اللاعب امتلاكه للياقة بدنية عالية تؤهله للإيفاء بهذه المتطلبات خلال المنافسة، لذا نجد المدربين يتبعون كافة الاساليب وطرائق التدريب في سب
... Show More