Preferred Language
Articles
/
jperc-1442
The Effectiveness of Concept Maps in Academic Achievement among Family Education Students in the Subject of the Art of Elegance and Fashion
...Show More Authors

Abstract

The current research aims to identify the effectiveness of concept maps in the academic achievement of the art of elegance and fashion for third vocational students. The current research is a quasi-experimental one. The research sample consisted of (74) female students in Al-Saydiyah secondary school for girls, they were divided into two groups: the experimental group and the control group. The following hypothesis was developed: There are no statistically significant differences at the level (0.05) between the average scores of the students who studied the subject using concept maps and the average scores of the students who studied the subject in the traditional method in the post-achievement test. The research results showed there are statistically significant differences at the level (0.05) between the average scores of the students who studied the subject using concept maps and the average scores of the students who studied the subject in the traditional method in the post-achievement test in favor of the experimental group. In light of the research result, it concludes that the concept maps are highly effective and contribute significantly to improving the performance of students in the achievement test. Finally, the research came out with a set of recommendations and suggestions.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
تقويم قانون الخدمة الجامعية رقم 23 لسنة 2008 وأثره في تقليل مظاهر الفساد الإداري والمالي: دراسة تحليلية قدية لنصوص القانون وتطبيقاته
...Show More Authors

This research includes an analytical and critique study for the version of the University Service Law No.23 for the year 2008, containing all its aspects and failure whether in its legislation or its applications.

View Publication Preview PDF
Publication Date
Sun Oct 04 2020
Journal Name
وزارة التخطيط/الجهاز المركزي للتقييس والسيطرة النوعية
تحضير وتشخيص ودراسة نظرية وتجريبية لتثبيط تأكل سبيكة الفا- براص في ماء البحر ‏بفعل مثبط تأكل جديد مشتق من 2-امينوبينزوثايوزول
...Show More Authors

يهدف البحث إلى تحضير سلسلة من معقدات العناصر الانتقالية ثنائية التكافؤ(المنغنيز, الكوبلت, النيكل, الخارصين ‏والكادميوم) مع المركب الجديد(‏KL‏) والمشتق من تفاعل ثنائي كبريتيد الكاربون و المركب الوسطي (‏HD‏). شخصت ‏المعقدات ذات الصيغة العامة[‏M(L)2‎‏] بواسطة طيف الرنين النووي المغناطيسي البروتوني والكربوني للمركب الجديد ‏وقياسات الأشعة تحت الحمراء والطيف الإلكتروني ودرجات الانصهار و التوصيلية المولارية و ت

... Show More
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of College Of Physical Education
تأثير تمارين الهايبوكسيك على جهاز التجديف الارضي (الاركوميتر) في تحمل السرعة والمستوى الرقمي لفعالية 200متر تجديف كاياك للاعبي المنتخب الوطني للشباب
...Show More Authors

Publication Date
Fri Jan 01 2016
Journal Name
Diyala Journal For Pure Sciences
Synthesis, Characterization and Biological Activity for Complexes VO(II), Mn(II), Co(II) and Ni(II) With New Multidentate Ligand [2-((E)-3-(2-hydroxyphenylimino)-1,5-dimethyl-2-phenyl-2,3-dihydro-1H-pyrazol-4- ylimino)acetic Acid][H2L] type (N2).
...Show More Authors

In this work, the precursor [2-(1,5-dimethyl-3-oxo-2-phenyl-2,3-dihydro-1H-pyrazol-4-ylimino)acetic acid] was synthesised from 4-aminoantipyrine and glyoxylic acid, this precursor has been used in the synthesis of new multidentate ligand [2-((E)-3-(2-hydroxyphenylimino)-1,5-dimethyl-2-phenyl-2,3-dihydro-1H-pyrazol-4-ylimino)acetic acid][H2L] type (N2O2). The ligand was refluxed in ethanol with metal ions [VO(II), Mn(II), Co(II) and Ni(II)] salts to give complexes of general molecular formula:[M(H2L)2(X)(Y)].B, where: M=VO(II), X=0, Y=OSO3-2, B=2H2O; M=Mn(II),Co(II) ,X=Cl, Y=Cl, B=0; M=Ni(II), X=H2O, Y=Cl, B=Cl. These complexes were characterised by atomic absorpition(A.A), F.T-I.R., (U.V-Vis)spectroscopies (1H,13C NMR for ligand only), alon

... Show More
Publication Date
Wed Jan 01 2025
Journal Name
Heliyon
Treatment of hospital wastewater by anodic oxidation using a new approach made by combining rotation with pulsed electric current on Cu-SnO2–Sb2O5 rotating cylinder anode
...Show More Authors

View Publication
Scopus (1)
Crossref (4)
Scopus Crossref
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Robust Two-Step Estimation and Approximation Local Polynomial Kernel For Time-Varying Coefficient Model With Balance Longitudinal Data
...Show More Authors

      In this research, the nonparametric technique has been presented to estimate the time-varying coefficients functions for the longitudinal balanced data that characterized by observations obtained through (n) from the independent subjects, each one of them is measured repeatedly by group of  specific time points (m). Although the measurements are independent among the different subjects; they are mostly connected within each subject and the applied techniques is the Local Linear kernel LLPK technique. To avoid the problems of dimensionality, and thick computation, the two-steps method has been used to estimate the coefficients functions by using the two former technique. Since, the two-

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Branch and Bound Algorithm with Penalty Function Method for solving Non-linear Bi-level programming with application
...Show More Authors

The problem of Bi-level programming is to reduce or maximize the function of the target by having another target function within the constraints. This problem has received a great deal of attention in the programming community due to the proliferation of applications and the use of evolutionary algorithms in addressing this kind of problem. Two non-linear bi-level programming methods are used in this paper. The goal is to achieve the optimal solution through the simulation method using the Monte Carlo method using different small and large sample sizes. The research reached the Branch Bound algorithm was preferred in solving the problem of non-linear two-level programming this is because the results were better.

View Publication
Crossref
Publication Date
Sun Nov 01 2015
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
Melasma, Melasma-Like Lichen Planus Actinicus, and Butterfly Lichen Planus Actinicus Build up One Spectrum (Clinico-Histopathological Study)
...Show More Authors

KE Sharquie, AA Noaimi, MA Al-Shukri, Journal of Cosmetics, Dermatological Sciences and Applications, 2015 - Cited by 3

View Publication
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Engineering
Synchronous Buck Converter with Perturb and Observe Maximum Power Point Tracking Implemented on a Low-Cost Arduino-microcontroller
...Show More Authors

Maximum power point tracking (MPPT) is used in photovoltaic (PV) systems to enhance efficiency and maximize the output power of PV module, regardless the variation of temperature, irradiation, and the electrical characteristics of the load. A new MPPT system has been presented in this research, consisting of a synchronous DC-DC step-down Buck converter controlled by an Arduino microcontroller based unit. The MPPT process with Perturb and Observe method is performed with a DC-DC converter circuit to overcome the problem of voltage mismatch between the PV modules and the loads. The proposing system has high efficiency, lower cost and can be easily modified to handle more energy sources. The test results indicate that the u

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF