MH Hamzah, AF Abbas, International Journal of Early Childhood Special Education, 2022
The current study aims to investigate the effect of (SWOM) strategy on acquiring the psychological concepts of educational psychology course and its retention among education college students. To do this, a sample of (57) male and female student were intentionally selected from first grade, Kurdish department / college of education / Ibin Rushd of human sciences. The sample distributed on two classes, whereby the experimental group consisted of (28) student were taught according to the (SWOM) strategy while the control group made up of (29) student were taught based on the tradition method. The two researchers designed a scale included (50) item to measure students' achievement. The experiment lasted for ten weeks, SPSS was used
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreIncorporating modern technology into education is becoming imperative. Numerous pharmacy institutions are incorporating virtual reality (VR) technology training into their curricula to enhance educational experience. This review examines the current state, historical evolution, and application of VR programs in pharmacy education and training. The review also provides details about the main challenges and limitations associated with the use of this technology. The VR technology, including virtual laboratories and simulations, significantly improves clinical training and educational outcomes. The utilization of VR in clinical teaching encounters numerous barriers, including ethical concerns and technological constraints, as well as other res
... Show MoreBackground: Feeding is a complicated process that involves the coordination of cardiovascular, respiratory, gastrointestinal (GI), and oropharyngeal mechanisms, with support from the musculoskeletal and craniofacial systems. The practice of feeding could be correlated with eruption stage and nutritional status in infants. Aim of the study: This study aimed to assess the relation of feeding patterns to a selected oral variable (stage of the eruption of primary teeth) and growth parameters among clinically healthy infants. Subjects and Methods: A cross-sectional comparative study on a sample of (300) infants aged between 6 and 18 months was performed in Karbala City, Iraq. The feeding pattern was investigated using an information sheet ans
... Show MoreThis study aimed to identify the attitudes of school teachers and principals at basic government schools in Ajloun governorate towards the inclusion of disabled students at basic schools, and investigate how they will accept the merger. To achieve the purpose of this study, a questionnaire containing 35 items was administered to school teachers and principals to measure their attitudes toward the inclusion of disabled students in regular schools. The sample of this study consisted of 43 male teachers and (74) female teachers and principals. The frequency, normal distribution, arithmetic means and t-test were used to analyze the data of present study. The findings showed that there
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper