Preferred Language
Articles
/
jcoeduw-303
The principals and techniques of geography text book for fourth secondary: The principals and techniques of geography text book for fourth secondary
...Show More Authors

Abstract
The curriculum is the major effective tool in achieving the goals of
education and society.

Many countries that want to reach the forefront of developed countries
through their curriculum have realized this fact. School text book, the
application assessment for knowing the rang of success or fail of this text
book in achieving the general aims. therefore this study aims at assessing the
principals and techniques of geography text book for fourth secondary class of
literary studying from the teachers point of view according to the fields of the
book, style of material, technical arrangement of the material, ethnical
arrangement the language of the book, style of the material, technical
arrangement of the activities of the language of the book .
The researcher has used questionnaire for fulfilling the research aims.
The study is designed according to the pilot study in which its validity and
reliability have been examined.
The study contains ( 50 ) items have divided in to (5 ) fields .
The researcher has used the mean. Pearson's correlation coefficient and
percentage as a statistical means.
The results show that the book divesting has got the first rank in 80 .14% and
in mean 2.40, the language of the mean (6.12%) and mean (1.83) and at the
final rank is the book activities which have got ( 58.22% ) and mean ( 1.69 )
In the light of the finding of the present study, several conclusion,
recommendation and suggestions for further study have been made .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Dec 24 2021
Journal Name
Journal Of Engineering Science And Technology. Journal Of Engineering Science And Technology
Grey-Level Image Compression Using 1-D Polynomial and Hybrid Encoding Techniques
...Show More Authors

Scopus (5)
Scopus
Publication Date
Thu May 30 2024
Journal Name
Iraqi Journal Of Science
A Review Study on Forgery and Tamper Detection Techniques in Digital Images
...Show More Authors

Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Sustainable Engineering And Innovation
A review of enhanced image techniques using chaos encryption
...Show More Authors

Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Dec 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Comparative Evaluation of the Effect of Different Universal Adhesives and Bonding Techniques on the Marginal Gap of Class I Composite Restoration (A SEM Study)
...Show More Authors

Background: With the increase in composite material use in posterior teeth, the concerns about the polymerization shrinkage has increased with the concerns about the formation of marginal gaps in the oral cavity environment. New generation of adhesives called universal adhesive have been introduced to the market in order to reduce the technique sensitive bonding procedures to give the advantage of using the bonding system in any etching protocol without compromising the bonding strength. The aim of the study was to study marginal adaptation of two universal adhesives (Single bondâ„¢ Universal and Prime and Bond elect) using 3 etching techniques under thermal cycling aging. Materials and Methods: Forty-eight sound maxillary first premola

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Oct 02 2016
Journal Name
Journal Of Educational And Psychological Researches
(تقويم كتاب الحاسوب للصف الثاني المتوسط وفقاً للتنور التقني ومقترحات تطويره)
...Show More Authors

 The aim of the current research was to evaluate the content of the computer textbook for second grade intermediate in Iraq in accordance with the technological literacy and submitting developmental suggestions, the researchers adopted the descriptive and analytical approach. The researchers used as a population and sample of thier research are the content of the computer textbook for second grade intermediate. 

In order to prepare the first draft of the research tool that content the five technological literacy fields (The Nature of Technology, Technology and Society, Design, Abilities of Technological World, The Designed World).

The researchers distributed the first d

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 31 2016
Journal Name
مجلة البحوث التربوية و النفسية
تقويم كتاب الحاسوب للصف الثاني المتوسط وفقاً للتنور التقني ومقترحات تطويره
...Show More Authors

The aim of the current research was to evaluate the content of the computer textbook for second grade intermediate in Iraq in accordance with the technological literacy and submitting developmental suggestions, the researchers adopted the descriptive and analytical approach. The researchers used as a population and sample of her research are the content of the computer textbook for second grade intermediate. In order to prepare the first draft of the research tool that content the five technological literacy fields (The Nature of Technology, Technology and Society, Design, Abilities of Technological World, The Designed World). The researchers distributed the first draft tool among some experts and gave them enough time to check each item

... Show More
Preview PDF
Publication Date
Wed Jul 20 2016
Journal Name
مجلة ابحاث الذكاء والقدرات العقلية
تقويم كتاب الحاسوب للصف الاول المتوسط وفقاً للتنور التقني ومقترحات تطويره
...Show More Authors

هدف البحث الى تقويم محتوى كتاب الحاسوب للصف الاول المتوسط في العراق وفقاً للتنور التقني وتقديم مقترحات لتطويره, واعتمدت الباحثتين المنهج الوصفي التحليلي. تكون مجتمع البحث وعينته من محتوى كتاب الحاسوب المقرر لطلبة الصف الاول المتوسط, وتم بناء أداة البحث بصيغتها الاولية متمثلة بقائمة لمحاور التنور التقني الخمسة (طبيعة التقنية، والتقنية والمجتمع، والتصميم "جانب مهاري"، وقدرات لدعم العالم التقني, والعالم المُ

... Show More
Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
The impact of strategic leadership skills on effective environmental management according to the (VUCA Prime) model
...Show More Authors

Purpose: clarify the integrative relationship of strategic leadership skills and effective management and the role of those skills combined or individually in achieving effective management.

Research design: The researchers used the quantitative method by surveying a class sample from the heads of the executive departments in a group of Iraqi private banks, consisting of (106) individuals according to the (VUCA Prime) methodology for effective management and the ten skills model for Johansen. The questionnaire was analyzed using a model of the structural equation.

Findings: The most prominent results of the research were the presence of a weak ro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2009
Journal Name
Al-khwarizmi Engineering Journal
The Investigation of Monitoring Systems for SMAW Processes
...Show More Authors

The monitoring weld quality is increasingly important because great financial savings are possible because of it, and this especially happens in manufacturing where defective welds lead to losses in production and necessitate time consuming and expensive repair. This research deals with the monitoring and controllability of the fusion arc welding process using Artificial Neural Network (ANN) model. The effect of weld parameters on the weld quality was studied by implementing the experimental results obtained from welding a non-Galvanized steel plate ASTM BN 1323 of 6 mm thickness in different weld parameters (current, voltage, and travel speed) monitored by electronic systems that are followed by destructive (Tensile and Bending) and non

... Show More
View Publication Preview PDF