Active learning is a teaching method that involves students actively participating in activities, exercises, and projects within a rich and diverse educational environment. The teacher plays a role in encouraging students to take responsibility for their own education under their scientific and pedagogical supervision and motivates them to achieve ambitious educational goals that focus on developing an integrated personality for today’s students and tomorrow’s leaders. It is important to understand the impact of two proposed strategies based on active learning on the academic performance of first-class intermediate students in computer subjects and their social intelligence. The research sample was intentionally selected, consisting of 99 students. The experimental group comprised 33 students from division (B) who were taught according to the first proposed strategy, while the second experimental group, represented by division (A), and also consisted of 33 students. The control group, made up of 33 students from division (C), was taught using the usual method. Two tools have been prepared: an achievement test with 40 items and a measure of social intelligence consisting of 20 items. The research results indicated that the experimental groups, which utilized the first and second proposed strategies based on active learning, outperformed the control group. As a result, several conclusions, recommendations, and proposals were made.
This research asks what are negative social behaviours in the Kurdistan Region of Iraq (KRI) raised by the talk shows on the (NRT) channel? Furthermore, it aims to identify the most significant themes addressed by talk shows on the (NRT) channel regarding negative social behaviours in the KRI by using the content analysis approach through non-random purposive sampling to understand the dialogue contents that dealt with this subject. This study has reached a set of results: through its talk shows, the (NRT) channel attempts to create a media vision about the spread of negative social behaviours in the KRI and stand up to the dangers associated with these behaviours. At the same time, those programs tried to marginalize the behaviours that
... Show MoreThe support qualitative information regards as an additional step in the process of decision-making where the method following by companies to provide information help in the creation of value because it is very important to deliver information to investors about their stratigies and what happen truly inside the companies i.e. every case relating with the expectations of stockhotslder and the prices of markets depending on those expectation ,and if the matter isn’t that there will be lack of confidence thate couldn’t be backed again. The decisions of the investors effected by security ,economic ,political, psychological, emotional ,and financial factors .
... Show MoreThe major aim of this research is study the effect of the type of lightweight aggregate (Porcelinite and Thermostone), type and ratio of the pozzolanic material(SF and HRM) and the use of different ratios of w/cm ratio(0.32 and 0.35) on the properties of SCLWC in the fresh and hardened state. SF and HRM are used in three percentage 5%,10%, and 15% as a partial replacement by weight of
cement for all types of SCLWC. The requirements of self-compatibility for SCC are fulfilled by using the high performance superplasticizer (G51) at 1.2liter per 100 kg of cement. The values of air dry density and compressive strength at age of 28 days within the limits of structural lightweight concrete. The air dry density and compressive strength at a
Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreIn this study, an efficient compression system is introduced, it is based on using wavelet transform and two types of 3Dimension (3D) surface representations (i.e., Cubic Bezier Interpolation (CBI)) and 1 st order polynomial approximation. Each one is applied on different scales of the image; CBI is applied on the wide area of the image in order to prune the image components that show large scale variation, while the 1 st order polynomial is applied on the small area of residue component (i.e., after subtracting the cubic Bezier from the image) in order to prune the local smoothing components and getting better compression gain. Then, the produced cubic Bezier surface is subtracted from the image signal to get the residue component. Then, t
... Show MoreThe objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.
... Show MoreThe rise of edge-cloud continuum computing is a result of the growing significance of edge computing, which has become a complementary or substitute option for traditional cloud services. The convergence of networking and computers presents a notable challenge due to their distinct historical development. Task scheduling is a major challenge in the context of edge-cloud continuum computing. The selection of the execution location of tasks, is crucial in meeting the quality-of-service (QoS) requirements of applications. An efficient scheduling strategy for distributing workloads among virtual machines in the edge-cloud continuum data center is mandatory to ensure the fulfilment of QoS requirements for both customer and service provider. E
... Show More