Preferred Language
Articles
/
jcoeduw-908
The Impact of Polia Strategy in the Achievement and Retention of the Grammar of the Arabic Language
...Show More Authors

ABSTRACT
Threw this research to the following:
1 - Know the impact of strategy Puglia in the collection of the rules of the Arabic language
students at the Institute of preparation parameters .
2 - Know the impact of the retention strategy in Puglia collection rules Arabic language
students at the Institute of preparation parameters .
To verify the status Mmermaa Find researcher Elsafreeten following two hypotheses :
1 - There is no statistically significant difference between the average score for the collection
of the fourth grade students at the Institute for the preparation of material parameters who
were studying grammar strategy Puglia and average grades collectible fourth grade
students at the Institute of preparation parameters who are studying the same article the
usual way in the achievement test .
2 - There is no statistically significant difference between the average score for fourth-grade
students in the preparation of the Institute who are studying material parameters Grammar
strategy Puglia and the average scores in the fourth grade students of the Institute who set
up the parameters studying the same article the usual way to test retention .
Search by:
1 - Sets - a sample of fourth-grade students in the Department of Arabic Language Institute in
the preparation of the parameters in the province of Baghdad , Rusafa / 1
2 - Number of Topics Book Arabic grammar for students to be taught fourth grade Institutes
of preparation parameters for the academic year 2012-2013 .
3 - duration of the experiment one semester .
The sample of research ( 50) asking them to ( 25) students of the experimental group
and ( 25) a student of the control group of fourth grade students prepare parameters Institute
chose randomly .
Researcher chose a setting designs with partial test after me and the two experimental
and control groups ( experimental group used the strategy in Puglia solution grammatical
issues , and the control group , which used the method used ) .
Rewarded researcher between the two sets of research in the following variables :
chronological age / educational material in the former Arabic grammar / previous experience .
The researcher on the achievement test tool to search and extract properties
Alsekoumtria him, and used statistical methods to process the data statistically , namely:

- t- test for two independent samples (t-test).
2 - equivalent chi-square (X2).
3 - difficult equation paragraph .
4 - paragraph equation discrimination .
5 - effective alternatives erroneous equation ( Almmohat )
6 - Pearson correlation coefficient to calculate stability .
7 - Spearman Brown formula to correct the reliability coefficient .
Your search returned the following results : The results showed statistical degrees of
achievement test that the average scores of the experimental group is ( 72 ) and the average
score for the control group is ( 04,60 ) , as shown in the table (4) , and after testing the
significance of the difference between the averages using test samples t for samples
independent , results indicated the presence of statistically significant difference between the
average score for the collection of the two groups , for the benefit of the experimental group
as the value of T is calculated ( 184.2 ) is greater than the amount of tabular ( 2.01 ) , and it
rejects the null hypothesis and accept the alternative , which means that Puglia strategy have
an impact on achievement .
Taking the results showed statistical retention test scores that the average scores of the
experimental group is ( 36.70 ) and the average score for the control group is ( 72.61 ) , and as
shown in the table (12) , and after testing the significance of the difference between the
averages using t- test for two independent samples , it appeared that the difference was not
statistically significant , since the value of T is calculated ( 130.2 ) is greater than the amount
of tabular ( 01,2 ) , and therefore accept the alternative hypothesis , which means that the
strategy of Puglia her effectiveness in retaining the grammatical rule .
In light of the findings of the research can be concluded as follows:
1 . Puglia effective strategy to collect information grammatical fourth grade students at the
Institute of preparation parameters .
2 . Puglia effective strategy to retain information grammatical fourth grade students at the
Institute of preparation parameters.
In light of the findings and conclusions of the research researcher recommends the
following:
1 . Use problem-solving strategies in the teaching of grammatical issues as an important part
and the part of the essential aspects of teaching Arabic grammar when needed.
2 . Attention to students and activate their role in resolving the more grammatical issues and
limiting the role of the teacher on the supervision and guidance when necessary.
An update on the search researcher suggests the following:
1 . Conduct a similar study of the current study and observe the impact on student
achievement and retention textured literature .
2 . Conduct a similar study of the current study in other educational stages to get to know the
impact of the strategic Puglia in the collection and retention of other categories .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 04 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced IOT Cyber-Attack Detection Using Grey Wolf Optimized Feature Selection and Adaptive SMOTE
...Show More Authors

The Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats.  This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Proposed Entropy Loss function and application to find Bayesian estimator for Exponential distribution parameter
...Show More Authors

The aim of this paper to find Bayes estimator under new loss function assemble between symmetric and asymmetric loss functions, namely, proposed entropy loss function, where this function that merge between entropy loss function and the squared Log error Loss function, which is quite asymmetric in nature. then comparison a the Bayes estimators of exponential distribution under the proposed function, whoever, loss functions ingredient for the proposed function the using a standard mean square error (MSE) and Bias quantity (Mbias), where the generation of the random data using the simulation for estimate exponential distribution parameters different sample sizes (n=10,50,100) and (N=1000), taking initial

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
A review on Activated Carbon Prepared from Agricultural Waste using Conventional and Microwave Activation
...Show More Authors

In the recent years the research on the activated carbon preparation from agro-waste and byproducts have been increased due to their potency for agro-waste elimination. This paper presents a literature review on the synthesis of activated carbon from agro-waste using microwave irradiation method for heating. The applicable approach is highlighted, as well as the effects of activation conditions including carbonization temperature, retention period, and impregnation ratio. The review reveals that the agricultural wastes heated using a chemical process and microwave energy can produce activated carbon with a surface area that is significantly higher than that using the conventional heating method.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Modern Applied Science
Hybrid Methodology for Image Segmentation Based on Active Contour Module and Alpha-Shape Theory
...Show More Authors

The concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present s

... Show More
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Mon Apr 09 2018
Journal Name
Al-khwarizmi Engineering Journal
Experimental Evaluation and Finite Element Simulation to Produce Square Cup by Deep Drawing Process
...Show More Authors

Deep drawing process to produce square cup is very complex process due to a lot of process parameters which control on this process, therefore associated with it many of defects such as earing, wrinkling and fracture. Study of the effect of some process parameters to determine the values of these parameters which give the best result, the distributions for the thickness and depths of the cup were used to estimate the effect of the parameters on the cup numerically, in addition to experimental verification just to the conditions which give the best numerical predictions in order to reduce the time, efforts and costs for producing square cup with less defects experimentally is the aim of this study. The numerical analysis is used to study

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Bayesian Tobit Quantile Regression Model Using Double Adaptive elastic net and Adaptive Ridge Regression
...Show More Authors

     Recently Tobit  Quantile Regression(TQR) has emerged as an important tool in statistical analysis . in order to improve the parameter estimation in (TQR) we proposed Bayesian hierarchical model with double adaptive elastic net technique  and Bayesian hierarchical model with adaptive ridge regression technique .

 in double adaptive elastic net technique we assume  different penalization parameters  for penalization different regression coefficients in both parameters λ1and  λ, also in adaptive ridge regression technique we assume different  penalization parameters for penalization different regression coefficients i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Journal Of Engineering
An Extensive Literature Review on Risk Assessment Models (Techniques and Methodology) for Construction Industry
...Show More Authors

This study looks into the many methods that are used in the risk assessment procedure that is used in the construction industry nowadays. As a result of the slow adoption of novel assessment methods, professionals frequently resort to strategies that have previously been validated as being successful. When it comes to risk assessment, having a precise analytical tool that uses the cost of risk as a measurement and draws on the knowledge of professionals could potentially assist bridge the gap between theory and practice. This step will examine relevant literature, sort articles according to their published year, and identify domains and qualities. Consequently, the most significant findings have been presented in a manne

... Show More
View Publication Preview PDF
Crossref (4)
Crossref