أن عملية التعلم لازالت تسير بنفس الاسلوب المتبع الذي لا يعتبر المتعلمة محور اساسي في عملية التعلم مما سبب ظهور الملل وانخفاض الرغبة لدى المتعلمات للتعلم لغياب الحافز, ولكون المهارات الاساسية بكرة السلة كالمناولة الصدرية والطبطبة بتغير الاتجاه والتصويب السلمي تعد من المهارات المهمة في اللعبة تم اجراء هذه الدراسة الذي يهدف الى اعداد منهج تعليمي قائم على انموذج التعلم البنائي والتعرف على تأثيره في بعض المهارات الاساسية الهجومية, وكان اهم فروض البحث الى وجود فرق معنوي دال احصائيا بين نتائج الاختبارات القبلية والبعدية لكلا المجموعتين الضابطة والتجريبية , تم استخدام المنهج التجريبي بتصميم المجموعتين المتساويتين بالعدد , وتمثلت عينة البحث بمجموعة من طالبات كلية التربية البدنية وعلوم الرياضة للبنات – جامعة بغداد , وتم اتباع السياق العلمي في تحقيق اجراءات البحث الميدانية وتحديد الوسائل الاحصائية المناسبة , وبعد معالجة النتائج توصلت الباحثتان الى استنتاجات اهمها التأثير الايجابي لنموذج التعلم البنائي في تعلم المهارات الاساسية الهجومية بكرة السلة للطالبات , وكانت اهم التوصيات الى الأخذ بنتائج هذه الدراسة والى استخدام هذا النموذج في عملية التعلم للمهارات المختارة
Purpose – The main purpose of this research is to highlight the main role of strategic leadership skills for top managements in accessing to effective management in accordance with the (VUCA Prime) methodology in (VUCA) environment as Miniature virtual environment, which refers to (Volatility), (Uncertainty), (Complexity), and (Ambiguity).
methodology – To achieve the research objective, this study selected the quantitative approach in research design, Questionnaire was used as the main instrument for data collection, the sample comprised the opinion poll (106) individual who functions as a head department. (Structural equation modelling by (Smart Pls3)
... Show MoreEssential approaches involving photons are among the most common uses of parallel optical computation due to their recent invention, ease of production, and low cost. As a result, most researchers have concentrated their efforts on it. The Basic Arithmetic Unit BAU is built using a three-step approach that uses optical gates with three states to configure the circuitry for addition, subtraction, and multiplication. This is a new optical computing method based on the usage of a radix of (2): a binary number with a signed-digit (BSD) system that includes the numbers -1, 0, and 1. Light with horizontal polarization (LHP) (↔), light with no intensity (LNI) (⥀), and light with vertical polarization (LVP) (↨) is represen
... Show MoreOrganizations must interact with the environment around them, so the environment must be suitable for that interaction. These companies are now trying to become Learning Organizations because it try to face that challenges may rise from its environments. The Learning Organization is a concept that is becoming an increasingly widespread philosophy in modern companies, from the largest multinationals to the smallest ventures. What is achieved by this philosophy depends considerably on one's interpretation of it and commitment to it. This study gives a definition that we felt was the true ideology behind the Learning Organization and Group Working. A Learning Organization is one in which people at all levels
... Show MoreAbstract
The study aims to build a training program based on the Connectivism Theory to develop e-learning competencies for Islamic education teachers in the Governorate of Dhofar, as well as to identify its effectiveness. The study sample consisted of (30) Islamic education teachers to implement the training program, they were randomly selected. The study used the descriptive approach to determine the electronic competencies and build the training program, and the quasi-experimental approach to determine the effectiveness of the program. The study tools were the cognitive achievement test and the observation card, which were applied before and after. The study found that the effectiveness of the training program
... Show MoreA hand gesture recognition system provides a robust and innovative solution to nonverbal communication through human–computer interaction. Deep learning models have excellent potential for usage in recognition applications. To overcome related issues, most previous studies have proposed new model architectures or have fine-tuned pre-trained models. Furthermore, these studies relied on one standard dataset for both training and testing. Thus, the accuracy of these studies is reasonable. Unlike these works, the current study investigates two deep learning models with intermediate layers to recognize static hand gesture images. Both models were tested on different datasets, adjusted to suit the dataset, and then trained under different m
... Show MoreThe emergence of SARS-CoV-2, the virus responsible for the COVID-19 pandemic, has resulted in a global health crisis leading to widespread illness, death, and daily life disruptions. Having a vaccine for COVID-19 is crucial to controlling the spread of the virus which will help to end the pandemic and restore normalcy to society. Messenger RNA (mRNA) molecules vaccine has led the way as the swift vaccine candidate for COVID-19, but it faces key probable restrictions including spontaneous deterioration. To address mRNA degradation issues, Stanford University academics and the Eterna community sponsored a Kaggle competition.This study aims to build a deep learning (DL) model which will predict deterioration rates at each base of the mRNA
... Show MoreActivity recognition (AR) is a new interesting and challenging research area with many applications (e.g. healthcare, security, and event detection). Basically, activity recognition (e.g. identifying user’s physical activity) is more likely to be considered as a classification problem. In this paper, a combination of 7 classification methods is employed and experimented on accelerometer data collected via smartphones, and compared for best performance. The dataset is collected from 59 individuals who performed 6 different activities (i.e. walk, jog, sit, stand, upstairs, and downstairs). The total number of dataset instances is 5418 with 46 labeled features. The results show that the proposed method of ensemble boost-based classif
... Show MoreThe aim of the current research is to reveal the effect of using brain-based learning theory strategies on the achievement of Art Education students in the subject of Teaching Methods. The experimental design with two equal experimental and control groups was used. The experimental design with two independent and equal groups was used, and the total of the research sample was (60) male and female students, (30) male and female students represented the experimental group, and (30) male and female students represented the control group. The researcher prepared the research tool represented by the cognitive achievement test consisting of (20) questions, and it was characterized by honesty and reliability, and the experiment lasted (6) weeks
... Show MoreArtificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show More