The current study aims to examine the level of problems faced by university students in distance learning, in addition to identify the differences in these problems in terms of the availability of internet services, gender, college, GPA, interactions, academic cohort, and family economic status. The study sample consisted of (3172) students (57.3% females). The researchers developed a questionnaire with (32) items to measure distance learning problems in four areas: Psychological (9 items), academic (10 items), technological (7 items), and study environment (6 items). The responses are scored on a (5) point Likert Scale ranging from 1 (strongly disagree) to 5 (strongly agree). Means, standard deviations, and Multivariate Analysis of Vari
... Show Moreيرمي البحث الحالي الى تقويم أداء طالبات الصف الاول متوسط في مهارات القراءة الجهرية ، وذلك من خلال الاجابة عن هدفي البحث : 1- ما مستوى أداء طالبات الصف الأول المتوسط في كل مهارة من مهارات القراءة الجهرية ؟ 2- ما مستوى الأداء العام لطالبات الصف الأول المتوسط في القراءة الجهرية ؟ يقتصر البحث الحالي على: 1- مهارات القراءة الجهرية 2- عينة من مدارس البنات الن
المقدمة
ما كان للعرب في تاريخهم الطويل قبل الإسلام، وبعده أن يبدعوا ما أبدعوه في صنع الحضارة وتاريخها ، لولا اعتمادهم أنظمة تربوية سليمة في التنشئة والتعليم، ولولا ان عصورهم قد عرفت مربين ، ومعلمين، وعلماء اسهموا في تقديم نظريات تربوية آثرت في تقدم الفكر التربوي وفي تقدم الإنسان.
فمن الطبيعي أن تكون للعرب تربية منظمة، ولمفكريهم عناية بهذه التربية في كل حقب تاريخهم الطويل، ما د
... Show MoreObjectives: The study aims to assess the school refusal behavior of first class pupils at primary schools and identifying the relationship between the school refusal behavior and some of socio-demographic characteristics for the pupils.
Methodology: A descriptive-analytic study was initiated from November 1st, 2012 to April 1st, 2013. A random sample of 411 students is selected from a probability stratified sample of 17 primary schools for both sexes in 4 sectors in Baghdad Al-Rasafa and Al-Karkh districts which are selected randomly from first class of primary school. A Self administrative questionnaire (Parents' Version) which constructed by the rese
... Show MoreGingival crevicular fluid (GCF) may reflect the events associated with orthodontic tooth movement. Attempts have been conducted to identify biomarkers reflecting optimum orthodontic force, unwanted sequallea (i.e. root resorption) and accelerated tooth movement. The aim of the present study is to find out a standardized GCF collection, storage and total protein extraction method from apparently healthy gingival sites with orthodontics that is compatible with further high-throughput proteomics. Eighteen patients who required extractions of both maxillary first premolars were recruited in this study. These teeth were randomly assigned to either heavy (225g) or light force (25g), and their site specific GCF was collected at baseline and aft
... Show MoreElectrochemical machining is one of the widely used non-conventional machining processes to machine complex and difficult shapes for electrically conducting materials, such as super alloys, Ti-alloys, alloy steel, tool steel and stainless steel. Use of optimal ECM process conditions can significantly reduce the ECM operating, tooling, and maintenance cost and can produce components with higher accuracy. This paper studies the effect of process parameters on surface roughness (Ra) and material removal rate (MRR), and the optimization of process conditions in ECM. Experiments were conducted based on Taguchi’s L9 orthogonal array (OA) with three process parameters viz. current, electrolyte concentration, and inter-electrode gap. Sig
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show Moreتقييم قابلية اداء متطلبات العمل للعاملين في الصناعة باستخدام طريقة القصور الذاتي
The aim of the current study is to identify the effectiveness of cognitive conflict strategy in comprehending reading among literary fifth students in literature and literature texts. The researcher uses experimental method with partial control. The sample consisted of (80) students distributed into control and experimental groups. The scientific material, the behavioral goals, the teaching plans, and the instrument of the research have been prepared (reading comprehension test) by the researcher.
The instrument's validity and reliability have been calculated and then applied to the sample. After treating the data statistically by using SPSS, the results have revealed that there is a statistically significant difference at the si
... Show MoreThere are different types of corruptions such as administrative, political, economic and financial corruption. The corruption forms also varied such as bribery, nepotism and extortion. All types and forms of corruption play significant role in the all economic variables generally and on investments in particular, and the corruption used to be an intermediate means in reducing the rate of economic growth. The corruption contributes in reducing the domestic investments via pay bribery by investors to officials’ persons for supplemental contracts and tenders which finally leads to reduction in the investment efficiency. The corruption also contributes in rise of operational costs for the investment projects. In additio
... Show More