Preferred Language
Articles
/
whZ58osBVTCNdQwCzeZw
The Impact of Teachers using Storytelling Techniques through Virtual Instruction to Increase English Speaking Ability
...Show More Authors

DBN Rashid, INTERNATIONAL JOURNAL OF DEVELOPMENT IN SOCIAL SCIENCE AND HUMANITIES, 2021

View Publication
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Disjuncts and Conjuncts: A Syntactic Type of Study to Evaluate Kurdish Students' Writing in English (At University Level)
...Show More Authors

The principal concern of this study is Disjunct and Conjunct adverbials in the
English language. The study sets out to explore and clarify the types, nature and
structure of disjuncts and conjuncts. It also aims at testing student's performance to
evaluate the use and usage of the disjuncts and conjuncts in their written performance.
Two tests, accordingly, were given to some fifty students of at the Dept. of English, at
the college of languages (third and fourth stages) in the University of Sulaimani. The
hypothesis that the study was based on are those students use disjuncts and conjuncts
hardly enough in their writings and when doing so, they generally tend to stick only to
the most commonly used and familiar o

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
A study on predicting crime rates through machine learning and data mining using text
...Show More Authors
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o</p> ... Show More
View Publication
Scopus (11)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed May 03 2023
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Enhancing smart home energy efficiency through accurate load prediction using deep convolutional neural networks
...Show More Authors

The method of predicting the electricity load of a home using deep learning techniques is called intelligent home load prediction based on deep convolutional neural networks. This method uses convolutional neural networks to analyze data from various sources such as weather, time of day, and other factors to accurately predict the electricity load of a home. The purpose of this method is to help optimize energy usage and reduce energy costs. The article proposes a deep learning-based approach for nonpermanent residential electrical ener-gy load forecasting that employs temporal convolutional networks (TCN) to model historic load collection with timeseries traits and to study notably dynamic patterns of variants amongst attribute par

... Show More
View Publication
Crossref
Publication Date
Fri Jan 09 2026
Journal Name
Journal Of Physical Education
The impact of a computerized program (cogniplus) to develop the strength to focus and perform kinetic chain on the balance beam
...Show More Authors

View Publication
Publication Date
Fri Jun 03 2022
Journal Name
Journal Ofxi'an University Of Architecture & Technology
Extent of mathematics teachers' appreciation of the mathematical problem `multiple solutions
...Show More Authors

Aims to find out the (Extent of mathematics teachers' appreciation of the mathematical problem `multiple solutions) Research sample consisted of (100) mathematics teachers distributed on the General Directorates of Education in Baghdad (Rusafa 1/2/3) and (Karkh 1/2/ 3) There was two research approach which are: The first - two different answers of students to the same issue where teachers must assess each answer and explain which one the teacher will accept and why? The second - Different solutions of students' to the same issue, including wrong answers , Teachers should correct the answers and give them final grades (0-10). Descriptive and analytical Approch was used in this research methodology And zero hypotheses, which are as f

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 02 2017
Journal Name
Journal Of Educational And Psychological Researches
The relation of kindergartens teachers emotive equanimity with the kindergarten child's anxiety
...Show More Authors

The researcher aims to  detect the emotive equanimity in kindergartens teachers,also to uncover the anxiousness in children of kindergartens,then to detect the relationship between them,then to choose the simple random way which is about(180) teachers and children,when the twore searchers made two tools to measure the emotive equanimity and the anxiety for both teachers and children,statistical methods had been used include:(pearsons correlation coefficient,t-test for one sample,t-test for two independent samples are individuals).the researcher led to multiple results:

1-the teacher has an emotive equanimity.

2-children has no anxiousness.

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 02 2023
Journal Name
Applied Sciences
Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review
...Show More Authors

The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach

... Show More
View Publication Preview PDF
Scopus (127)
Crossref (117)
Scopus Clarivate Crossref
Publication Date
Mon Jan 09 2023
Journal Name
College Of Islamic Sciences
The door of speaking souls From the book explaining the features of the origins of religion For Sheikh Abdul Rahman bin Abdullah Al-Khonji study and investigation
...Show More Authors

Praise be to God who created the soul, perfected it, and inspired it with its immorality and piety. He says in His Noble Book: ﭤ Fajr: 27-30 Glory be to You, O God! O Lord, on whom I have chosen for You as a beloved from myself and the soul of the two worlds, may our master Muhammad be sacrificed for him, who enlightened the horizons with his introduction to enlightenment. It soon ends with the end of pleasure, which is the opposite of the pleasure of thought and meaning, as it is permanent and continuous, and from here we see that the Messenger of God, may God’s prayers and peace be upon him, urges us in various places to seek knowledge and fortify the soul and thought in a way that raises one’s status and protects him from the st

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Alternative security solutions offered by virtual private network vpn model proposal to use alternatives to Cisco and Microsoft security in al-rasheed bank-delegate general office- northern region
...Show More Authors

The study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.

The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 02 2013
Journal Name
Baghdad Science Journal
Effect of zinc oxid on the bentonite ability for removing Methylene blue from solution
...Show More Authors

A batch adsorption system was applied to study the adsorption of methylene blue from aqueous solution by Iraqi bentonite and treated bentonite with different amount of zinc oxide (ZnO). The adsorption capacities of methylene blue onto bentonite were evaluated. The equilibrium between liquid and solid phase was described by Langmuir model better than the Freundlich model. Langmuir and Freundlich constants have been determined. The separation factor or equilibrium parameter, RL which is used to predict if an adsorption system is favourable or unfavourable was calculated for all cases.

View Publication Preview PDF
Crossref