Preferred Language
Articles
/
jcoeduw-303
The principals and techniques of geography text book for fourth secondary: The principals and techniques of geography text book for fourth secondary
...Show More Authors

Abstract
The curriculum is the major effective tool in achieving the goals of
education and society.

Many countries that want to reach the forefront of developed countries
through their curriculum have realized this fact. School text book, the
application assessment for knowing the rang of success or fail of this text
book in achieving the general aims. therefore this study aims at assessing the
principals and techniques of geography text book for fourth secondary class of
literary studying from the teachers point of view according to the fields of the
book, style of material, technical arrangement of the material, ethnical
arrangement the language of the book, style of the material, technical
arrangement of the activities of the language of the book .
The researcher has used questionnaire for fulfilling the research aims.
The study is designed according to the pilot study in which its validity and
reliability have been examined.
The study contains ( 50 ) items have divided in to (5 ) fields .
The researcher has used the mean. Pearson's correlation coefficient and
percentage as a statistical means.
The results show that the book divesting has got the first rank in 80 .14% and
in mean 2.40, the language of the mean (6.12%) and mean (1.83) and at the
final rank is the book activities which have got ( 58.22% ) and mean ( 1.69 )
In the light of the finding of the present study, several conclusion,
recommendation and suggestions for further study have been made .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 31 2006
Journal Name
Modern Sport
The standerd Levels of Some Physical abilities based on playing centers of basketball for youngsters
...Show More Authors

Research,s Summary The purpose of the research was to specify the standerd Levels for results of basketball for Iraqi young sters, Becuse there werenot the standerd Levels which related to the testings abilities of the players based on plying centers specially the physical abilities, This made weakness in arrangement and putting the suitable training studies for different age stadges which suitable with game ,s requirements, besides evaluation the performance of the plyers in common and the levels of the coachs train in special according to the scientific style. The researchers depended on (8) special testings of chossen physical abilities, These testings applied on the teams, young players for sharing clubs among excellent series of basket

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Modis Satellite Data Evaluation for Detecting the Dust Storm Using Remote Sensing Techniques Over Iraq
...Show More Authors
Abstract<p>The phenomena of Dust storm take place in barren and dry regions all over the world. It may cause by intense ground winds which excite the dust and sand from soft, arid land surfaces resulting it to rise up in the air. These phenomena may cause harmful influences upon health, climate, infrastructure, and transportation. GIS and remote sensing have played a key role in studying dust detection. This study was conducted in Iraq with the objective of validating dust detection. These techniques have been used to derive dust indices using Normalized Difference Dust Index (NDDI) and Middle East Dust Index (MEDI), which are based on images from MODIS and in-situ observation based on hourly wi</p> ... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding text in gray image using mapping technique
...Show More Authors

Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
The Concept of Value in De Saussair Linguistics and their Extension in the Book (Arabic Language, Its Meaning and Structure) by Tammam Hassan
...Show More Authors

This research was distributed into two sections, the first section was concerned with the concept of value for De Saussair and its methodological impact on his linguistic structural conceptions with respect of the distinction between synchronism and diachronism, the value role of linking function between the sounds and the though, the basing of his theoretical conception on the language being a form and not a material according to this principle and the value impact on the demonstration that the linguistic element acquires its functional importance from the relations inside the language system. It also stopped at the methodological impact of value on defining the analytical linguistic unit and the value role in semantics through the prin

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 01 2025
Journal Name
مجلة الترجمة واللسانيات
الحبكة ودورها في الادب القصصي نماذج مختارة من الكتاب المقدس
...Show More Authors

Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Educational And Psychological Researches
The effect of (SWOM) strategy on acquiring the psychological concepts of educational psychology course and its retention among education college students
...Show More Authors

The current study aims to investigate the effect of (SWOM) strategy on acquiring the psychological concepts of educational psychology course and its retention among education college students. To do this, a sample of (57) male and female student were intentionally selected from first grade, Kurdish department / college of education / Ibin Rushd of human sciences. The sample distributed on two classes, whereby the experimental group consisted of (28) student were taught according to the (SWOM) strategy while the control group made up of (29) student were taught based on the tradition method. The two researchers designed a scale included (50) item to measure students' achievement. The experiment lasted for ten weeks, SPSS was used

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Some Robust methods for Estimates the power Spectrum in ARMA Models Simulation Study
...Show More Authors

Abstract:

Robust statistics Known as, resistance to errors caused by deviation from the stability hypotheses of the statistical operations (Reasonable, Approximately Met, Asymptotically Unbiased, Reasonably Small Bias, Efficient ) in the data selected in a wide range of probability distributions whether they follow a normal distribution or a mixture of other distributions deviations different standard .

power spectrum function lead to, President role in the analysis of Stationary random processes, form stable random variables organized according to time, may be discrete random variables or continuous. It can be described by measuring its total capacity as function in frequency.

<

... Show More
View Publication Preview PDF
Crossref