The present study aims to explore the effectiveness of a proposed study unit based on the funds of knowledge theory in developing the attitudes towards cultural identity and the proposed study unit. In order to achieve the goal of the study, the two researchers followed the quasi-experimental approach, where the study sample consisted of (28) female students of the fifth-grade at Al-Jeelah Basic Education School, Al-Dakhiliyah Governorate in the Sultanate of Oman. The data were collected by two scales: the first is a scale of attitudes towards cultural identity consisting of (26) items. The second was a scale of attitudes towards the proposed study unit, which consisted of (24) items. The results of the study revealed that the effect of the proposed unit in improving the attitudes of fifth grade students towards cultural identity and to the proposed study unit. It came in favor of the post-application; where the medium of the cultural identity scale reached (3.81), and with a medium average (4.74) for the scale of attitude towards proposed unite. In light of this, the two researchers recommended the importance of employing the theory of funds of knowledge in building social studies curricula and benefiting from the experiences of families and their culture in strengthening the attitudes towards cultural identity and preserving it from loss and extinction.
The goal of this research to identify the effect of the probing questions in the collection of material literature with students of the Kurdish language department, to achieve the aim of the research, the researcher has chosen a sample from the students of third stage of the Kurdish language Department, Faculty of Education / Ibn Rushd as a field for the application of experiment.The number of sample reached (71) students divided into two groups represented two divisions of the experimental groups under study to the style of questions sounding by (35) students, and represented the other division of the control group, which studied in the way normal and by (36) students, as rewarded r
... Show MoreThe present research aims to design an electronic system based on cloud computing to develop electronic tasks for students of the University of Mosul. Achieving this goal required designing an electronic system that includes all theoretical information, applied procedures, instructions, orders for computer programs, and identifying its effectiveness in developing Electronic tasks for students of the University of Mosul. Accordingly, the researchers formulated three hypotheses related to the cognitive and performance aspects of the electronic tasks. To verify the research hypotheses, a sample of (91) students is intentionally chosen from the research community, represented by the students of the college of education for humanities and col
... Show MoreThe study aims to identify the extent the academics in colleges of applied sciences are familiar with the themes of the national strategy of education 2040 in the Sultanate of Oman. The researchers used the descriptive approach, as well as they adopted a questionnaire with five dimensions as a tool for data collection, which was applied to (120) academics. The results showed that the academics of the applied colleges' familiarity with the National Strategy for Education 2040 in the Sultanate of Oman is average. The study also found that there were no statistically significant differences in the academics estimates of the extent of the Colleges of Applied Sciences academics’ familiarity with the themes of the National Education 2040 Str
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreSome children are suffering from introversion in kindergartens , so it must be confront and obviated by specialists because it will inevitably lead to unsatisfactory results reflect negatively on the individual and the community together . And the introvert child is a miserable child incapable of social interaction or give - and - take with colleagues , lack of integration of the child to life leads to the obstruction of participation with his peers in various activities. Introversion causes a real emotional deficit to the children of kindergartens which limits of possibility of their intellectual development and mental growth and that because of their isolation and poor focus in education
... Show MoreThe subject of education, and since time immemorial, gripe the attention of the religious, intellectual, political, social and economic elites. This attention not only in Iraq, but in different countries in the world. There is a close correlation between the educational level of the societies and the edginess of its rising and advancement in all fields.
In order to achieve the research objectives, the research has been divided into three sections: section I include the historical, scientific, humanitarian evolution of education, starting from the first economic revolution (The Agricultural revolution) through the second economic revolution (The Industrial Revolution) and till the Third Economi
... Show MoreReceipt date:10/8/2019 acceptance date:18/12/2019 Publication date:31/12/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
This research is concerned with the concept of identity in general "Overall definition" and is not exposed to the classifications of identity or concepts that deal with their types and classifications, only the concept in terms of the initial picture as well as the views of thinkers on the proof of
... Show MoreThis research deals with the form of the physical identity which is concerned with the features and characteristics that distinguish the shape of the city from other existing cities and reveal its similarity with the self (itself) and objective difference with others. Accordingly, these features must be sophisticated and variable resulting the shape of the city, while preserving the continuity of time, and eventually leads to the emergence of the whole shape. Physical identity is conceptually equivalent with the terms "personality" and "sense of place". The research determined the criteria for evaluating the physical identity as follows:
... Show MoreThe aim of this research is to find out the impact of cognitive incompatibility schemes on the development of creative thinking skills among first grade students.
To prove the objective of the research, the researcher put the following hypothesis:
There is no statistically significant difference at the level of (0.05) between the average score of the experimental group who study the history of ancient civilizations according to the patterns of cognitive conflict and the average grades of the control group students who study the same subject in the usual way in the test of post-creative thinking skill
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show More