Preferred Language
Articles
/
jperc-1434
The Effectiveness of a Training Program Based on Connectivism Theory in Developing E-Learning Competencies among Teachers of Islamic Education in Dhofar Governorate
...Show More Authors

Abstract

The study aims to build a training program based on the Connectivism Theory to develop e-learning competencies for Islamic education teachers in the Governorate of Dhofar, as well as to identify its effectiveness. The study sample consisted of (30) Islamic education teachers to implement the training program, they were randomly selected. The study used the descriptive approach to determine the electronic competencies and build the training program, and the quasi-experimental approach to determine the effectiveness of the program. The study tools were the cognitive achievement test and the observation card, which were applied before and after. The study found that the effectiveness of the training program in developing cognitive achievement and practical performance related to the e-learning competencies of the study sample. One of the most important recommendations of the study is to train Islamic education teachers to design electronic tests and use interactive tools in the classroom and extracurricular activities based on e-learning and to prepare electronic training bags based on The Connectivism theory in developing the professional competencies of teachers of Islamic education in general and e-learning in teaching in particular.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 15 2017
Journal Name
International Journal Of Image And Data Fusion
Image edge detection operators based on orthogonal polynomials
...Show More Authors

View Publication
Scopus (32)
Crossref (10)
Scopus Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Improve topic modeling algorithms based on Twitter hashtags
...Show More Authors
Abstract<p>Today with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned</p> ... Show More
View Publication
Scopus (20)
Crossref (19)
Scopus Crossref
Publication Date
Thu Aug 01 2019
Journal Name
2019 2nd International Conference On Engineering Technology And Its Applications (iiceta)
Human Gait Identification System Based on Average Silhouette
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Effect of risk selection policy for life insurance on the prodectivity of iraqi insurance company
...Show More Authors

The life insurance companies need a sound system to use it in selecting Insurable risks so they can avoid or reduce possible losses that may be insured to a minimum levels , But the application within IRAQI INSURANCE  COMPANY reflects that it still depends on a traditional ways in the procedures used to select that risks .

                 This  research represents an attempt to put acceptable suggestions about developing a system for selecting insurable risks which used now by iraqi insurance company by recognizing the risks of life insurance , determining kinds of risks which can difined as normal and upnormal risks , rectification of the

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 23 2021
Journal Name
Al-nahrain Journal Of Science
A Clinical-Statistical Study on COVID-19 Cases in Iraq: A Case Study
...Show More Authors

Background: COVID-19 is a disease that started in Wuhan/China in late 2019 and continued through 2020 worldwide. Scientists worldwide continue to research to find vaccines, treatments, and medication for this disease. Studies also conenue to find the pathogenicity and epidemiology mechanisms. Materials and Methods: In this work, we analyzed cases obtained from Alshifaa center in Baghdad/Iraq for 23/2/2020-31/5/2020 with total instances of 797, positive cases of 393, and death cases of 30. Results: Results showed that the highest infection cases were among people aged between 41-45. Also, it was found that males' number of cases was more than females. In contrast, death cases were significantly higher in males than females. It was not

... Show More
View Publication
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Assess the Reality of the Process of Applying the strategic Innovation In Business organizations : A prospective Study of comparative analysis in anumber of business organizations the Iraqi Industrial
...Show More Authors

Abstract :

      The research aims to Estimate the Strength of Strategic Innovation application in terms of application strength , and on the overall level in number of Iraqi Industrial business organizations . After wards determine whether their is differerences among those organizations in application process for the dimensions , and for the overall process .

      The Research revealed number of conclusions including that the process of strategic innovation is applied in a good Level , and demonstrates the desier of the industrial companies Leaders to Launch beyond the familiar products , and to provide new products that

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The obstacles affecting the tax reform in Iraq: Applied research in the General Authority for Taxation
...Show More Authors

    In light of this, attention should be paid to tax reform as part of a comprehensive economic reform program. Therefore, the research started from the problem of the weak efficiency of the tax reform process in the General Authority for Taxation, as well as the need to know the addition of new taxes or increase taxes.The research aims study the relative importance of each disabled person, whether organizational, human, financial, legislative or technical. The research led to a number of conclusions, the most important of which were that the financial obstacles occupy the highest importance of the other obstacles and for the success of the tax reform, the material resources must be provided in order to provide the n

... Show More
View Publication Preview PDF
Crossref