ريل لسادة الكيسياء َ جؼ البحث الى التعخؼ عمى أثخ استخاتيجية فجػة السعمػمات في التح َى جؼ البحث فقج صيغت الفخضية التي َ تػسط , والتحقق مغ ى ُ جى شلاب الرف الثاني الس َ ل جؼ البحث أعتسج الباحث َ تتعمق بالتحريل ولتحقيق ى ػعتيغ متداويتيغ ُ بي لسجس ِ ي السشيج التجخ ريل الجراسي , تكػنت عيشة البحث مغ َ ) شالب مغ شلاب ٗٛ( ذواتي اختبار بعجي لمتح -ٕٕٕٓالرف الثاني الستػسط في ( متػسصة الذييج خزيخ جاسع العارضي ) لمعاـ الجارسي ( ا ٕٗ) حيث بمغ عجد شلاب السجسػعة التجخيِبية (ٕٕٖٓ َ ) شالب , ٕٗ ) شالب و الزبصة ( ت السجسػعتاف في بعس الستغيخات ( العسخ الدمشي بالذيػر , التحريل الجراسي لمػالجيغ َ وكػفئ , اختبار الحكاء , اختبار السعمػمات الدابقة لسادة الكيسياء ) , تع اعجاد اختبار تحريمي لسادة فقخة مػضػعية مغ نػع الاختيار مغ متعجد , وتع (40)الكيسياء وتألف اختبار التحريل مغ جسػعة الزابصة َ ت الس ُ فق استخاتيجية فجػة السعمػمات ودرس ُ جسػعة التجخيبية عمى و َ تجريذ الس جسػعتي البحث ُ تبار التحريل عمى كلا م ُ نتياء التجخبة شبق اخ ِ تيادية وعشج ا َ خيقة اع َ وفق الص . ابصة َ يبية والز ِ التجخ وقج أضيخت الشتائج ػد فخؽ ُ : الى وج ُ ذ ج مدتػى دلالة َ و دلالة احرائية عش (0.05) جػة َ يجية ف ِ ات ػا عمى وفق استخ ُ بية الحيغ درس ِ ي جسػعة التجخ ُ تػسط درجات شلاب الس َ غ م ِ بي جات شلاب السجسػعة الزابصة الحي درسػا عمى وفق الصخيقة َ السعمػمات وبيغ متػسط در الاعتيادية في الاختبار التحريمي لرالح السجسػعة التجخيبية
The present research aims to know :
The level of Cognitive failures, information processing styles, and the problem-solving among the university students ,so it is aims to know the contribution of cognitive failures on the information processing styles and problem-solving, the research sample was (400) males and females student from the University of Wasit chosen randomly from both gender and for the study of the morning and evening .So these scales had been used as a research tool (failures cognitive scale ,the scale of information processing styles , and the scale of problem solving) , and by using the statistical m
... Show Morethe research goal is preparing a list of standard criteria and quality controls for information technology applications to serve the Holy Quran.
To achieve this goal, the researcher has built a list of criteria according to the following steps:
First - identify the key areas covered by the whole list which are:
1 – Standards of system building and implementing with the operating screens.
2 – Standards of display forms including audio and video presentation.
3 – Standards which are related to the program philosophy.
4 - Standards which are related to the program objectives.
... Show More
XML is being incorporated into the foundation of E-business data applications. This paper addresses the problem of the freeform information that stored in any organization and how XML with using this new approach will make the operation of the search very efficient and time consuming. This paper introduces new solution and methodology that has been developed to capture and manage such unstructured freeform information (multi information) depending on the use of XML schema technologies, neural network idea and object oriented relational database, in order to provide a practical solution for efficiently management multi freeform information system.
Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreSteganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality
... Show MoreIncreased epidemic when Akbari in his book Explanation in the expression of the Koran
This study aimed at investigating the effect of using computer in
Efficiency of Training Programme of Science Teachers in Ajloun District in
Jordan.
1- What is the effect of using computer in program for the two groups
2- ( the experimental and control group ) .
3- Are there any statistics different in the effect of using computer
program for the two groups ?
4- Are there any statistics (comparison ) or different of the effect of the
effect of using computer program refer to the sex (male or female )?
The community of the study consisted of all the science student in
educational directorate of Ajloun district for the academic year 2009 –
2010, they are (120) ( male and female) . The sample of the study<
تتراوح ضريبة الارض ما بين 10%من المحصول (الشعير ) و 40 -50 من الخراج
The issue of freedom is the most prominent and distinctive issue of Western thought, which it reached after a long struggle. The English thinker John Stuart Mill is considered the most prominent Western thinker who elaborated on the issue of freedom, until his ideas on the issue of freedom became the semi-final formula for issues of freedom in Western thought, which revolve in their entirety on The individual has complete freedom as long as it does not harm others, and this freedom is controlled by law.
And if the freedoms he offered were not considered an achievement in Western thought; Freedom in Islam is a central and fundamental issue, and the details of freedoms in Islam have not been accomplished by anyone, but rather came
... Show MoreBackground: The events in pregnancy elicit one of the best examples of selective anatomical, physiological and biochemical adaptations, with profound changes in respiratory physiology. The changes in respiratory physiology are due to increased size of the fetus with advance gestation which constitutes a mechanical impediment to normal process of ventilation.
.Patients and methods: This study started from the 1st of Nov. 2009 till the 30th of Oct. 2010. pregnant women aged (16-44 years) of different weight, height and different conception from 1st, 2nd, 3rd trimester and post term were included. Spirometry was performed in Baghdad teaching hospital( pulmonary fun
... Show More