Preferred Language
Articles
/
jperc-1181
The effectiveness of a teaching program based on the McCarthy Model (4MAT) in developing creative writing skills and reflective thinking among university students
...Show More Authors

The aim of this study was to determine the effect on using the McCarthy Model (4MAT) for developing creative writing skills and reflective thinking among undergraduate students. The quasi-experimental approach was adopted. And, in order to achieve the study objective, the educational content of Teaching Ethics (Approach 401), for the plan for the primary grades teacher preparation program  was dealt with by using a teaching program based on the McCarthy Model (4MAT) was used.

The study which was done had been based on the academic achievement test for creative writing skills, and the reflective thinking test. The validity and reliability of the study tools were also confirmed. The study was applied to a sample consisting of (66) students. 33 students were from the experimental group and 33 students were from the control group, and the academic achievement test for creative writing skills and a reflective thinking test were applied before and after the implementation of the study experiment, and the results of (ANCOVA) revealed the existence of statistically significant differences between the averages of sample groups Study in both tools; In favor of the experimental group, and the effect was large in each of the two tools, and in favor of the experimental group, the study recommended enriching academic programs in universities through modern teaching models and strategies to achieve Curricula learning outcomes in tandem with developing undergraduate students' skills. Several scientific researches have been proposed in the field of employing the McCarthy Model (4MAT) in developing various language.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Apr 18 2023
Journal Name
Corporate Reputation Review
The Absorptive Capacity of Knowledge as an Approach for Building Strategic Reliability in the Sponge Organizations/Small Organizations in Kirkuk Governorate as a Model
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jun 03 2020
Journal Name
Journal Of Applied Mathematics
Order and Chaos in a Prey-Predator Model Incorporating Refuge, Disease, and Harvesting
...Show More Authors

In this paper, a mathematical model consisting of a prey-predator system incorporating infectious disease in the prey has been proposed and analyzed. It is assumed that the predator preys upon the nonrefugees prey only according to the modified Holling type-II functional response. There is a harvesting process from the predator. The existence and uniqueness of the solution in addition to their bounded are discussed. The stability analysis of the model around all possible equilibrium points is investigated. The persistence conditions of the system are established. Local bifurcation analysis in view of the Sotomayor theorem is carried out. Numerical simulation has been applied to investigate the global dynamics and specify the effect

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
The use of the Principal components and Partial least squares methods to estimate the parameters of the logistic regression model in the case of linear multiplication problem
...Show More Authors

Abstract

  The logistic regression model is one of the nonlinear models that aims at obtaining highly efficient capabilities, It also the researcher an idea of the effect of the explanatory variable on the binary response variable.                                                                                  &nb

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Implementation of Transmitter Zigbee System based on Wireless Sensor Network of IEEE 802.15.4 Standard
...Show More Authors

Abstract

 

Zigbee is considered to be one of the wireless sensor networks (WSNs) designed for short-range communications applications. It follows IEEE 802.15.4 specifications that aim to design networks with lowest cost and power consuming in addition to the minimum possible data rate. In this paper, a transmitter Zigbee system is designed based on PHY layer specifications of this standard. The modulation technique applied in this design is the offset quadrature phase shift keying (OQPSK) with half sine pulse-shaping for achieving a minimum possible amount of phase transitions. In addition, the applied spreading technique is direct sequence spread spectrum (DSSS) technique, which has

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Aug 01 2014
Journal Name
Int. J. Mod. Eng. Res
Exact solutions for MHD flow of a viscoelastic fluid with the fractional Burgers’ model in an annular pipe
...Show More Authors

This paper presents an analytical study for the magnetohydrodynamic (MHD) flow of a generalized Burgers’ fluid in an annular pipe. Closed from solutions for velocity is obtained by using finite Hankel transform and discrete Laplace transform of the sequential fractional derivatives. Finally, the figures are plotted to show the effects of different parameters on the velocity profile.

View Publication
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Results In Control And Optimization
Impact of wind flow and global warming in the dynamics of prey–predator model
...Show More Authors

View Publication
Scopus (28)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Ijarah and lease ending with ownership and its implications for the bank's profits: A case study in the Emirates Islamic Bank and Emirates NBD
...Show More Authors

The formula of Ijarah and Ijarah ending with ownership is one of the investment formulas in Islamic banks, so this research has shed light on it in order to benefit from the experiences of the research sample banks, This research aims to find a reliable way for Iraqi Islamic banks, namely (leasing and leasing ending with ownership) in order to invest their money without usurious interests, The problem of the research emerges through the lack of awareness of the Iraqi Islamic banks to work with different Islamic financing formulas and their inability to invest their money through the adoption of their administrations for different formulas, including the leasing, and this is reflected in the decrease and fluctuation of its profits, Theref

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 20 2010
Journal Name
Mustansiria Dental Journal
Traumatic dental injuries of the permanent incisors and its relation to malocclusion in patients attending the pedodontic clinic in College of Dentistry, Baghdad University
...Show More Authors

Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Suggested Model for The Work of the Certified Fraud Examiner & His Role in Reducing The Incidents of Fraud and Corruption: An Applied Study in The Federal Board of Supreme Audit
...Show More Authors

Is hardly day expire without hearing the news either Abuse Managementthe accounting standards or the existence of serious misstatements by someauditors.Which caused the demanding of many companies in the recent republication of the financial statements and the re-announcement of its financialresults. Such acts raise questioning about the role that should be played by theauditors, prompting agencies responsible for setting auditing standards to takeTo throw increasingly responsibility on the auditors in order to interest risksfraud The Risks of Fraud in their review of the financial statements.also The Public Company Accounting Oversight Board in the U.S.called about the need of owning the Certified Public Accountants those whoaudits for

... Show More
View Publication Preview PDF