Preferred Language
Articles
/
jperc-916
The Effect of the Addie and Shayer Model on the Achievement of Fifth Grade Students and their Attitudes towards History: The Effect of the Addie and Shayer Model on the Achievement of Fifth Grade Students and their Attitudes towards History
...Show More Authors

Abstract

The current research aims to examine the effect of the Adi and Shayer model on the achievement of fifth-grade students and their attitudes toward history. To achieve the research objective, the researcher has adopted two null hypotheses. 1) there is no statistically significant difference at the level of (0.05) between the average score of students of the experimental group who study the history of Europe and modern American history according to the model of Addie and Shayer, and the average scores of the students of the control group who study the same subjects according to the traditional method in the test of post-achievement. 2) There was no statistically significant difference at the level (0.05) between the average scores of the experimental group who study the history of Europe and modern American history according to the model of Adi and Shayer, and the average scores of the control group who study the same subjects according to the traditional method in the direction of history. The researcher adopted an experimental design with partial adjustment and post-test. A sample of (60) students was distributed into two groups: (30) students as the experimental group and (30) students as the control group. In order to conduct the experiment, the researcher formulated the behavioral goals of (140) goals according to levels of bloom and a number of teaching plans. The researcher designed a test consists of (50) multiple-choice paragraphs. As for the attitude scale towards the material, it has consisted of (30) paragraphs. The researcher used a number of statistical methods that showed statistically significant differences in favor of the experimental group. In light of this, the researcher presented a number of conclusions, recommendations, and suggestions.                                                                      

Keywords: impact, model, collection, trends, history

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
A proposed model program to audit the contribution of municipal institutions to achieving the environmental dimension of sustainable development "applied research"
...Show More Authors

Abstract

               The research aimed to prepare an audit program focusing on the activities of municipal institutions related to the environmental dimension as one of the dimensions of sustainable development, and applying the program for the purpose of preparing an oversight report related to assessing the impact of the activities of municipal institutions on the environmental reality as the main channel through which municipal institutions contribute to achieving the part related to it. Among the requirements of sustainable development, the proposed program was prepared and applied to the institutions affiliated to the Directorate of Mu

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 01 2016
Journal Name
Al-academy
Harmonization formative in the design of interior spaces Hall of discussions in the design department (a model): بدريا محمد حسن فرج
...Show More Authors

Can not reach a comprehensive concept for interior design through the use of Harmonization term according transformations experienced by the terms of the variables associated with the backlog of cultures that characterize concepts according to the nature of the users of the spaces in the design output, which necessitates the meaning of the combination of knowledge, art, science, such as the type of perceptions design the Harmonization cognitive science with art to create products of the use of design configurations that help the designer to put such a product within the reality and like the fact that reliable, as well as the rational knowledge tend somehow to the objective specifically in facilitating the substance subject to perceptible

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 15 2019
Journal Name
Al-academy
Use of the Iraqi Song in the Orchestral Compositions of Hanz Moomer- (Foug Al-Nakhl) as a Model: فراس ياسين جاسم
...Show More Authors

The use of the Iraqi song in the symphony orchestra is one of the pioneering and important works, which carries with it an artistic value of aesthetic specificity in how to use the Iraqi singing heritage. The research aimed to identify the employment of the song (Foug Al-Nakhl) and its works within the Iraqi national symphony orchestra music by the author Hans Count Momer whose works still have a great influence on the authors of the Iraqi orchestra.  The researcher presented a brief introduction to the Iraqi Symphony Orchestra, a brief introduction about the author, and the trends of world music towards heritage. He also talked about musical composition, research procedures and tools, and applying the tool to the selected sample (F

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 03 2018
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Condition assessment and rehabilitation for trunk sewer deterioration based on Semi-Markov model
...Show More Authors

An accurate assessment of the pipes’ conditions is required for effective management of the trunk sewers. In this paper the semi-Markov model was developed and tested using the sewer dataset from the Zublin trunk sewer in Baghdad, Iraq, in order to evaluate the future performance of the sewer. For the development of this model the cumulative waiting time distribution of sewers was used in each condition that was derived directly from the sewer condition class and age data. Results showed that the semi-Markov model was inconsistent with the data by adopting ( 2 test) and also, showed that the error in prediction is due to lack of data on the sewer waiting times at each condition state which can be solved by using successive conditi

... Show More
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sat Dec 24 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The Effect of TNF-Alpha Gene Polymorphisms At -376 G/A, -806 C/T, and -1031 T/C on The Likelihood of Becoming a Non-Responder to Etanercept in A Sample of Iraqi Rheumatoid Arthritis Patients
...Show More Authors

Tumor necrosis factor-alpha (TNF-α) antagonists’ therapy are expensive and has a non-responsive rate between 30% to 40% in rheumatoid arthritis patients. Genetic variation plays a vital role in the responsiveness to this type of therapy.The aim of this study is to investigate if the presence of genetic polymorphism in the TNF-α gene promoter region at locations -376 G/A (rs1800750), -806 C/T (rs4248158), and -1031 T/C (rs1799964) affects rheumatoid arthritis patient's tendency to be a non-responder to etanercept.

Eighty RA patients on etanercept (ETN) for at least six months were recruited from the Rheumatology Unit at Baghdad Teaching Hospital. Based on The European League Against Rheumatism response (EULAR) criteria, patient

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (15)
Scopus Crossref
Publication Date
Wed Feb 05 2020
Journal Name
Political Sciences Journal
Kenyan foreign policy towards Somalia
...Show More Authors

Abstract The Kenyan policy towards Somalia was influenced by a set of interrelated factors between the two countries and stemmed from the internal environment and most prominent: the geographical factor, ethnic, cultural, religious, political, economic and security, has been dominated by this policy since independence from the British colonial administration in the sixties of the last century and so far the nature of instability and tension, As the two countries are geographically contiguous and as security risks escalate, Kenya in 2011 rushed military action against Somalia, the first military action by Kenya outside its borders since independence.

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 10 2017
Journal Name
Al-academy
The ideological effect in the in Interior space structure
...Show More Authors

Design system often generated relationship within the frame work of their concept of interior design a system or more can be created between design relationships within this concept in the structure of its internal space product. Through the division of all to it parts to reveal the hidden places and stages of composition and their relationship and interdependence between them. And then re- composition of all its parts, doth in the deign process at the initial stages or in the processes of treatments that are necessary after the completion of design and circulation. To be able to use other events close to the first events designed for them. In terms of idea logical in fluency and its social, economic, cultural and political dimension. As

... Show More
View Publication Preview PDF
Crossref