Preferred Language
Articles
/
jperc-1434
The Effectiveness of a Training Program Based on Connectivism Theory in Developing E-Learning Competencies among Teachers of Islamic Education in Dhofar Governorate
...Show More Authors

Abstract

The study aims to build a training program based on the Connectivism Theory to develop e-learning competencies for Islamic education teachers in the Governorate of Dhofar, as well as to identify its effectiveness. The study sample consisted of (30) Islamic education teachers to implement the training program, they were randomly selected. The study used the descriptive approach to determine the electronic competencies and build the training program, and the quasi-experimental approach to determine the effectiveness of the program. The study tools were the cognitive achievement test and the observation card, which were applied before and after. The study found that the effectiveness of the training program in developing cognitive achievement and practical performance related to the e-learning competencies of the study sample. One of the most important recommendations of the study is to train Islamic education teachers to design electronic tests and use interactive tools in the classroom and extracurricular activities based on e-learning and to prepare electronic training bags based on The Connectivism theory in developing the professional competencies of teachers of Islamic education in general and e-learning in teaching in particular.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A Haptic feedback system based on leap motion controller for prosthetic hand application
...Show More Authors

Leap Motion Controller (LMC) is a gesture sensor consists of three infrared light emitters and two infrared stereo cameras as tracking sensors. LMC translates hand movements into graphical data that are used in a variety of applications such as virtual/augmented reality and object movements control. In this work, we intend to control the movements of a prosthetic hand via (LMC) in which fingers are flexed or extended in response to hand movements. This will be carried out by passing in the data from the Leap Motion to a processing unit that processes the raw data by an open-source package (Processing i3) in order to control five servo motors using a micro-controller board. In addition, haptic setup is proposed using force sensors (F

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A missing data imputation method based on salp swarm algorithm for diabetes disease
...Show More Authors

Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2013
Journal Name
International Journal Of Computer Applications
Concise Architecture of a Remote Network based Controller
...Show More Authors

The development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Difficulties toward third level students in the department of Arabic language for both Education for Women College and Ibn Rushd/University of Baghdad for the studying of Arabic language curriculum: Difficulties toward third level students in the department of Arabic language for both Education for Women College and Ibn Rushd/University of Baghdad for the studying of Arabic language curriculum
...Show More Authors

Abstract
The curriculum is amodern science which reflects the social philosophy and
what it needs . It searches for amothod that limits the knowledge that the
indiridual gets in the society and the sorts of the culture that suits the enrironment
in which they live. It also clears for them their history and their great in heritance.
It has a great in flunce in their mental growth ,and it teacher the students new
roles in the thin king ,and training then on what they have learned . According to
there points the problem concentrats on the mostimpotant difficulties which facer
thestudents in studing Arabic langnage text-books
In spite of the great care that the text taker but it is full of subjects and studies
w

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
Measurement of radon gas concentration in water and soil samples in AL-Najaf governorate by using nuclear track detector (CR-39)
...Show More Authors

The radon gas concentration in environmental samples soil and water of selected regions in Al-Najaf governorate was measured by using alpha-emitters registrations which are emitted form radon gas in (CR-39) nuclear track detector. The first part is concerned with the determination of radon gas concentration in soil samples, results of measurements indicate that the highest average radon concentration in soil samples was found in (Al-Moalmen) region which was (100.0±7.0 Bq/m3), while the lowest average radon concentration was found in (Al-Askary) region which was (38.5±4.7 Bq/m3), with an average value of (64.23±14.9 Bq/m3) ,the results show that the radon gas concentrations in soil is below the allowed limit from (ICRP) agency which is (

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Nov 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Biological Effect of Different Concentrations of Bacillus Thurngensis Isolated From The Soils of Sawa Lake, Al Muthanna Governorate on The of Hypera postica at Different Time Periods
...Show More Authors
Abstract<p>This study conduct in Al-Muthanna governorate to assess five concentrations of <italic>Bacillus</italic> thurngensisagonist <italic>Hyperapostica</italic>. The results showed the presence of <italic>Bacillus thurngensisin</italic> all the studied sites of Lake Sawa in Muthanna Governorate, and the rates of its presence were close to the same sites, and the rate of its presence in those sites was 35%, and its highest rate was recorded in the north and east of the lake, as it reached 40% and the lowest amounted to 30% in the two sites south and west site. The results of the study showed that five concentrations were taken from bacterial isolates of <it></it></p> ... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jan 04 2020
Journal Name
زانكو - الإنسانيات
The Effect of Linguistic Propositions on the Collection of Arabic Language Norms and the Development of Critical Thinking among Middle-Grade Students.
...Show More Authors

The reality of teaching the Arabic language rules is not satisfactory, as the pedagogical methods used do not help students develop their mental skills, especially critical thinking skills. They are often traditional in terms of teaching students, who are passive, passive, often passive, active, and often active, their listening task, and the teacher's task of narrating facts and judgments. It is a blind simulation student, a dependency on others, and a weak spirit of creativity, innovation, and opinion. The opinions of educators and teachers almost agree on the reasons for students' weakness in learning the rules of Arabic, and that the reason lies in the way of teaching. The difficulty or the ease of the rules of Arabic does not lie in th

... Show More
View Publication Preview PDF