Preferred Language
Articles
/
pBfxQ44BVTCNdQwCzD8N
The Impact of Two Proposed Strategies Based on Active Learning on Students' Achievement at the Computer and Their Social Intelligence
...Show More Authors

Active learning is a teaching method that involves students actively participating in activities, exercises, and projects within a rich and diverse educational environment. The teacher plays a role in encouraging students to take responsibility for their own education under their scientific and pedagogical supervision and motivates them to achieve ambitious educational goals that focus on developing an integrated personality for today’s students and tomorrow’s leaders. It is important to understand the impact of two proposed strategies based on active learning on the academic performance of first-class intermediate students in computer subjects and their social intelligence. The research sample was intentionally selected, consisting of 99 students. The experimental group comprised 33 students from division (B) who were taught according to the first proposed strategy, while the second experimental group, represented by division (A), and also consisted of 33 students. The control group, made up of 33 students from division (C), was taught using the usual method. Two tools have been prepared: an achievement test with 40 items and a measure of social intelligence consisting of 20 items. The research results indicated that the experimental groups, which utilized the first and second proposed strategies based on active learning, outperformed the control group. As a result, several conclusions, recommendations, and proposals were made.

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A Haptic feedback system based on leap motion controller for prosthetic hand application
...Show More Authors

Leap Motion Controller (LMC) is a gesture sensor consists of three infrared light emitters and two infrared stereo cameras as tracking sensors. LMC translates hand movements into graphical data that are used in a variety of applications such as virtual/augmented reality and object movements control. In this work, we intend to control the movements of a prosthetic hand via (LMC) in which fingers are flexed or extended in response to hand movements. This will be carried out by passing in the data from the Leap Motion to a processing unit that processes the raw data by an open-source package (Processing i3) in order to control five servo motors using a micro-controller board. In addition, haptic setup is proposed using force sensors (F

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
Social Studies Teachers' Perceptions of the Importance of Employing Twenty-First Century Skills in Teaching
...Show More Authors

The study aimed to identify the perceptions of social studies teachers in the Governorate of Muscat about the importance of employing the skills of the twenty-first century in teaching. The study employed a qualitative approach. The two researchers used an analytical approach based on the Grounded Theory, the data was gathered through semi-structured interviews with (15) male and female teachers. The results indicated that social studies teachers relate the twenty-first-century skills more to improving students’ achievement level in the subject, while they see that these skills have less influence in developing students’ communication skills and cooperation with their peers. In light of the results of the study, the two researchers r

... Show More
View Publication Preview PDF
Publication Date
Mon May 27 2019
Journal Name
Al-academy
Problems of Social Networking Sites in Nurturing the Aesthetic Taste of Teenagers: زهراء صبحي خزعل
...Show More Authors

With the growing number of Internet users, public and private arts activities have become increasingly popular. Adolescents have begun to establish aesthetic taste and new cultural values. This category is the most affected one by the published images and ideas especially in the social networking space and specifically the Facebook. It is the most important problem in their cultural composition. This research aims to detect the problems of social networking sites in nurturing the aesthetic taste of adolescents. The researcher used the analytical descriptive approach to obtain accurate information describing the current situation or depicting the social reality of adolescents. The research concluded that the public discourse in social med

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 16 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Impact of omega 3 alone or in combination with irinotecan on bone marrow and spleen of rats: in vivo study
...Show More Authors

Abstract

Objectives: The present study designed to explore the genotoxicity through measurement of Mitotic index in bone marrow and the spleen cells, as possible mechanism of bone marrow and spleen toxicity that induced by irinotecan; and to describe the protective actions of omega 3 against irinotecan induced genotoxicity in bone marrow and the spleen of rats.

Methods: Twenty four (24) rats (Sprague-Dawley) were randomly divided into four groups: Group Ӏ, rats  received single oral daily dose of distilled water (2 ml/kg) for 25 days (negative control group); Group ӀӀ (irinotecan-treated), receiv

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Educational And Psychological Researches
The extent to which the content of social and national studies courses is included With interactive thinking maps for the stages of public education in the Kingdom of Saudi Arabia
...Show More Authors

The present study aimed to identify the extent to which the content of social and national studies courses was included in interactive thinking maps in the educational stages in the Kingdom of Saudi Arabia, and to achieve the goal of the study, the researcher used the descriptive and analytical approach, and the study tool used consisted of a content analysis card; Where it included a list of the types of thinking maps, where the study sample consisted of all social and national studies courses at the elementary and intermediate levels, and it is (12) books for the student in its first and second parts, and after verifying the validity and reliability of the tool, it was applied to the study sample, and the study reached conclusions, inc

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
The Organizational Climate Development in the Light of Job Stress Treatment: A Field Study in Governmental Sheltered Accommodation Houses in the Ministry of Labour and Social Affairs
...Show More Authors

        Job stress is considered one of the most important obstacles that may appear in the work field. In order to deal with the obstacles and challenges , the idea to deal with job stress has come to address job stress as one of the most important trends that enable organizations to face those challenges through focusing on the role of job stress and the organizational climate of the organization.

       The research deals with two variables: the job stress as an independent variable, and the organizational climate as a dependent one. Each variable includes five sub-dimensions. These dimensions have been involved in an interaction to form

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 18 2024
Journal Name
World Academy Of Sciences Journal
Impact of gene expression of NFE2L2 on serum superoxide dismutase and hemeoxygenase‑1 levels in patients with type 2 diabetes and retinopathy
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Apr 25 2018
Journal Name
Earthquake And Structures
Response of circular footing on dry dense sand to impact load with different embedment depths
...Show More Authors

Scopus (8)
Scopus