Preferred Language
Articles
/
_xYIpocBVTCNdQwCqlnR
A training program based on integrating futuristic thinking skills with classroom interaction patterns and its effect on the academic self- efficacy of mathematics teachers
...Show More Authors

The research aims to identify the effect of the training program that is based on integrating futuristic thinking skills with classroom interaction patterns on mathematics teachers in order to provide their students with creative solution skills. The research sample consisted of 31teachers (15 teachers for the experimental group and 16 for the control groups). The researcher developed a measure for the academic self-efficacy consisting of (39) items. Its validity, reliability, coefficient of difficulty and discriminatory power were estimated. To analyze the findings, the researcher adopted the Mann-Whitney (U) test and the effect size, and the findings were as follows: There is a statistically significant difference at the significance level of (0.05) between the average scores of mathematics teachers of the experimental group and the control group on the academic self-efficacy scale.

Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (9)
Scopus Crossref
Publication Date
Tue Jul 11 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effect of The Round Robin Strategy in Logical Thinking the Fourth in Chemistry
...Show More Authors

The study aims to identify the impact of the round-robin strategy on the logical thinking of fourth-year middle school students in chemistry. Two groups were employed:  an experimental group consisted of (30) students who were taught according to the round-robin strategy, and the control group consisted of (30) students who were taught according to the traditional method. The researcher adopted the experimental design with partial control by preparing the visual thinking test tool, which consists of (20) multiple-choice items, it was applied as a post-test on the research sample. The result showed that there was a statistically significant difference in favor of the experimental group, which was taught according to the Round Robin s

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of Physical Education Program on the Domains of the University Students, Attitudes toward Physical Fitness
...Show More Authors

Objectives: To determine the effectiveness of physical education program on the domains of the university
students attitudes of physical activity and health, physical activity and mental health, physical activity and nutrition
toward physical fitness.
Methodology: A quasi-experimental design is carried out throughout the present study with the application of
test-retest approach through the period from February 3rd 2013 to June 30th 2013. The study is conducted on
purposive sample of(40) Undergraduate Students at the College of Science University of Baghdad . The sample is
Consisted of (20) males and (20) females. Questionnaire of two main parts, Personal and demographic
information and students' attitudes about phys

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 25 2020
Journal Name
International Journal Of Research In Social Sciences And Humanities
THE EFFECT OF CAPITAL ADEQUACY AND ASSET QUALITY ON THE VALUE OF THE BANK AN APPLIED STUDY ON A SAMPLE OF IRAQI BANKS LISTED ON THE IRAQ STOCK EXCHANGE
...Show More Authors

As the banking sector is a strong influence on the country's economic growth,The solid financial well-being of anybank does not mean only a guarantee for its investors, It is also important for both owners and workers and for theeconomy in all its joints.The elements of capital adequacy and quality of assets are important to the functioning of thebanking business.In this study, the research sample included four private banks. Quarterly data were used for the period(2011 - 2018).Moreover, data is also collected from articles, papers, the World Wide Web (the Internet) and specializedinternational journals.In this research, an effort was made to try to find out the effect of (the ratio of the capital owned todeposits on the value of the bank),

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 17 2023
Journal Name
College Of Islamic Sciences
Class and its impact on society
...Show More Authors

Man has a great role in the development of society in all fields, and therefore the human thought played a great role in its continuous pursuit and insight into the social classes that differ in their privileges, which makes the members of society not reconcile because of that disparity that is not based on human principles, so one class exploits another, and this is what stopped me Rather, it prompted me to choose the topic (class and its impact on society) in order to show the impact of classes on each other negatively and positively, so I work to avoid the first with the recommendations I put forward and offer guidance, and strengthen the second, and after this topic of necessity in a place because of the imbalance and promise of appr

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Joint audit and its impact on the market value of firms listed on the Iraq Stock Exchange
...Show More Authors

The research aims to investigate the possibility of joint auditing in improving the market value of Iraqi companies listed on the Iraq Stock Exchange. The sample was represented by 10 Iraqi companies listed in the Iraq market for the period from 2014-2017 (2 years before implementation and 2 years after implementation) and the research was based on the idea that joint auditing enhances investor confidence and raises their level of security as a result of providing quality and reliable reports, and thus This indicates good news in the market that reflects on the performance of stocks and the market value of companies that adopt joint auditing. The results of the analysis indicate an improvement in the market value, but this improv

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu May 18 2023
Journal Name
College Of Islamic Sciences
Human right rule in self-defense And its prohibitions in Islamic jurisprudence
...Show More Authors

God, may He be glorified and exalted be He, has given every human being the right to life and a dignified life, and has warned against transgression against any of its sanctities without a legitimate right. No one, regardless of his status or authority, can deprive a person of his rights that the Sharia came to preserve, and whoever does that has declared all people to war, as all humanity is in solidarity. In raising the hand that is simplified to harm a person and oppress him unjustly and exalted in the land.
If this is the case, the Sharia came to establish the right of people, groups and individuals, to defend their sanctities, preserve their security, recover their usurped rights, repel the aggression of the aggressors, and oppre

... Show More
View Publication Preview PDF