Aims to find out the (Extent of mathematics teachers' appreciation of the mathematical problem `multiple solutions) Research sample consisted of (100) mathematics teachers distributed on the General Directorates of Education in Baghdad (Rusafa 1/2/3) and (Karkh 1/2/ 3) There was two research approach which are: The first - two different answers of students to the same issue where teachers must assess each answer and explain which one the teacher will accept and why? The second - Different solutions of students' to the same issue, including wrong answers , Teachers should correct the answers and give them final grades (0-10). Descriptive and analytical Approch was used in this research methodology And zero hypotheses, which are as f
... Show MoreThe present study discusses the problem based learning in Iraqi classroom. This method aims to involve all learners in collaborative activities and it is learner-centered method. To fulfill the aims and verify the hypothesis which reads as follow” It is hypothesized that there is no statistically significant differences between the achievements of Experimental group and control group”. Thirty learners are selected to be the sample of present study.Mann-Whitney Test for two independent samples is used to analysis the results. The analysis shows that experimental group’s members who are taught according to problem based learning gets higher scores than the control group’s members who are taught according to traditional method. This
... Show MoreTraditionally, path selection within routing is formulated as a shortest path optimization problem. The objective function for optimization could be any one variety of parameters such as number of hops, delay, cost...etc. The problem of least cost delay constraint routing is studied in this paper since delay constraint is very common requirement of many multimedia applications and cost minimization captures the need to
distribute the network. So an iterative algorithm is proposed in this paper to solve this problem. It is appeared from the results of applying this algorithm that it gave the optimal path (optimal solution) from among multiple feasible paths (feasible solutions).
The aim of this study to identify the effect of using two strategies for active learning ( Jigsaw Strategy & Problems Solving) in learning some balanced beam's skills in artistic gymnastics for women , as well as to identify the best of the three methods (jigsaw strategy , problems solving and the traditional method) in learning some skills balance beam , the research has used the experimental methodology, and the subject included the students of the college of Physical Education and Sports Sciences / University of Baghdad / third grade and by the lot was selected (10) students for each group of groups Search three and The statistical package for social sciences (SPSS) was used means, the standard deviation and the (T.test), the one way a n
... Show MoreStreamlined peristaltic transport patterns, bifurcations of equilibrium points, and effects of an inclined magnetic field and channel are shown in this study. The incompressible fluid has been the subject of the model's investigation. The Reynolds values for evanescence and an infinite wavelength are used to constrain the flow while it is being studied in a slanted channel with a slanted magnetic field. The topologies over their domestic and cosmopolitan bifurcations are investigated for the outcomes, and notion of the dynamical system are employed. The Mathematica software is used to solve the nonlinear autonomous system. The flow is found to have three different flow distributions namely augmented, trapping and backward flow. Outc
... Show MoreAll-optical canonical logic units at 40 Gb/s using bidirectional four-wave mixing (FWM) in highly nonlinear fiber are proposed and experimentally demonstrated. Clear temporal waveforms and correct pattern streams are successfully observed in the experiment. This scheme can reduce the amount of nonlinear devices and enlarge the computing capacity compared with general ones. The numerical simulations are made to analyze the relationship between the FWM efficiency and the position of two interactional signals. © 2015 Chinese Laser Press
The analysis of rigid pavements is a complex mission for many reasons. First, the loading conditions include the repetition of parts of the applied loads (cyclic loads), which produce fatigue in the pavement materials. Additionally, the climatic conditions reveal an important role in the performance of the pavement since the expansion or contraction induced by temperature differences may significantly change the supporting conditions of the pavement. There is an extra difficulty because the pavement structure is made of completely different materials, such as concrete, steel, and soil, with problems related to their interfaces like contact or friction. Because of the problem's difficulty, the finite element simulation is
... Show MoreColloidal crystals (opals) made of close-packed polymethylmethacrylate (PMMA) were fabricated and grown by Template-Directed methods to obtain porous materials with well-ordered periodicity and interconnected pore systems to manufacture photonic crystals. Opals were made from aqueous suspensions of monodisperse PMMA spheres with diameters between 280 and 415 nm. SEM confirmed the PMMA spheres crystallized uniformly in a face-centered cubic (FCC) array. Optical properties of synthesized pores PMMA were characterized by UV–Visible spectroscopy. It shows that the colloidal crystals possess pseudo photonic band gaps in the visible region. A combination of Bragg’s law of diffraction and Snell’s law of refraction were used to calculate t
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show More