Preferred Language
Articles
/
jperc-1324
A Blended Learning Program Based on the Next Generation Standards (NYS) to Develop the Teaching Performance of Middle School Mathematics Teachers and Some Students’ Future Thinking Skills
...Show More Authors

Abstract

The aim of the current research is to prepare an integrated learning program based on mathematics standards for the next generation of the NYS and to investigate its impact on the development of the teaching performance of middle school mathematics teachers and the future thinking skills of their students. To achieve the objectives of the research, the researcher prepared a list of mathematics standards for the next generation, which were derived from a list of standards. He also prepared a list of the teaching competencies required for middle school mathematics teachers in light of the list of standards, as well as clarified the foundations of the training program and its objectives and the mathematical practices that include. Additionally, he prepared an electronic skill test for mathematics teachers and a test for future thinking skills for pupils on the stage. The research sample consisted of a group of mathematics teachers at the intermediate stage, numbering (40) teachers who were divided into two experimental and control groups, and a group of intermediate school students; whose number reached (60) students, were divided into two experimental and control groups as well. The results revealed that there are differences between the experimental and control groups of teachers in the post-measurement of the skill-test of the teaching performance in favor of the experimental group and in the pre-post-test measurements of the experimental group in favor of the post-measurement, The results showed also that there are differences between the experimental and control groups of students in the post-measurement to test future thinking skills in favor of the experimental group and differences in the pre-post measurements to test the future thinking skills of the experimental group of students in the intermediate stage in favor of the post-measurement. In light of these results, the researcher presented a set of recommendations for training and preparing mathematics teachers and also made some suggestions for future research similar to the current research.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Emotion Recognition System Based on Hybrid Techniques
...Show More Authors

Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In

... Show More
View Publication Preview PDF
Scopus (24)
Crossref (23)
Scopus Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Engineering
Intelligent Dust Monitoring System Based on IoT
...Show More Authors

Dust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Multimedia Tools And Applications
Shot boundary detection based on orthogonal polynomial
...Show More Authors

View Publication
Scopus (41)
Crossref (35)
Scopus Clarivate Crossref
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Thu May 21 2026
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Tue Aug 23 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Face mask detection based on algorithm YOLOv5s
...Show More Authors

Determining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on

... Show More
Publication Date
Fri Aug 23 2024
Journal Name
Aro-the Scientific Journal Of Koya University
Graphical User Authentication Algorithms Based on Recognition
...Show More Authors

In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Accounting And Financial Sciences Journal
The Extent to which the Quality of Accounting Information Systems Contributes to Reducing Material
...Show More Authors

This research dealt with shedding light on the nature of material misrepresentations, in addition to knowing the extent to which the quality of accounting information systems contributes to reducing material misrepresentations On the theoretical side, a number of sources were relied upon in dealing with the research problem and presentation of the topic, while in the practical side, it was relied on the questionnaire form, where the research sample was (accountants and auditors), where 50 forms were distributed and 50 were received, and the data was analyzed and hypotheses tested through the program Statistical spss to show the relationship between the variables. The research reached a number of conclusions, the most important of which is t

... Show More
View Publication
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Experimental Study to Investigate the Effect of Polyacrylamide Gel to Reduce the Lost Circulation
...Show More Authors

One of the challenging issues encountered during drilling operations is the lost circulation. Numerous issues might arise because of losses, such as wasting of time and higher drilling cost. Several types of lost circulation materials have been developed and are being used to limit mud losses and avoid associated issues. Each solution has benefits and drawbacks.

In this study, a core flooding test was performed to study the effectiveness of polyacrylamide (PAM) granular gel on the reduction of the circulation lost. One common type of fracture characteristic is fractures with tips, commonly known as partially open fracture (POF). However, PAM gel therapy in POFs received little attention in prior research. Models of partly open fra

... Show More
View Publication Preview PDF
Crossref (2)
Crossref