Preferred Language
Articles
/
jperc-1638
The Degree of Student Teachers Acquisition at Sultan Qaboos University in Skills of Teaching Arabic via A Virtual Micro-Teaching Lab Based on their Point of View
...Show More Authors

The study aims to investigate the degree of student teachers at Sultan Qaboos University acquired skills in teaching Arabic via a virtual micro-teaching lab, as well as to reveal the difficulties they faced and their development proposals. To do this, the researchers developed a questionnaire divided into four dimensions: planning, implementation, evaluation, and

ethical values for the teaching profession, in addition to two open-ended questions to identify difficulties and suggestions. It was administered to (30) student teachers. The results revealed that the average degree of student-teacher acquisition of skills was high in its four dimensions. It ranged between (39.2) to (82.2), while the overall average was (56.2).

It also showed that the most difficulty faced by student teachers was in implementing classroom situations. It was (44%) represented in loss of direct communication with students, where the training suggestions got the highest percentage (9.46%). The research concluded with a set of recommendations,

including continuing efforts in training student teachers on interactive applications for distance learning and increasing teaching lab hours, where student teachers can repeat practical applications

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Iaes International Journal Of Artificial Intelligence (ij-ai)
Innovations in t-way test creation based on a hybrid hill climbing-greedy algorithm
...Show More Authors

<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. T

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Job enrichment, knowledge capital and its impact on strategic success: exploratory study at a sample of the Iraqi government and Private Colleges on Baghdad
...Show More Authors

The problem of research was the lack of research that dealt with issue of the job design approach that is more suitable for knowledge work, therefore, the research aims to determine the impact of job enrichment,  and knowledge capitalon strategic success, starting from the hypothesis that there significant impact of job enrichment and knowledge capital on strategic success, to achieve this goal the researchers from the theoretical literature and  related studies conclude to the construction of the scheme shows the hypothetical relationship between the variables, which was adopted job enrichment as independent variable while knowledge capital plays two roles, the first as an independent variable and the second as an intermediate

... Show More
View Publication
Crossref
Publication Date
Thu Oct 01 2015
Journal Name
American Research Thoughts
Investigation of some Oral Strategies and their Development to the Iraqi EFL Learners` Performance.
...Show More Authors

The present study deals with the effect of teaching oral Communication Strategies on English language learners. The use of oral communication strategies not only solves learners’ communication problems, but also enhances the learner’s interaction in target language, which in turn, improves their oral proficiency .The sample of this study is EFL students in the first stage at the Department of English Language, morning studies, College of Education /Ibn-Rushd .The sample of the study consists of (60) students distributed on experimental group(A) includes (30) students, and (30) students as control group(B). In order to achieve the aim of the study, and to gain a closer idea about the impact of teaching oral Communication Strategies on th

... Show More
Publication Date
Tue Aug 15 2023
Journal Name
Sumer 1
The effect of silver diamine fluoride on the microleakage of glass ionomer restoration in primary teeth at different time intervals
...Show More Authors

Silver diamine fluoride (SDF) has shown effectiveness in hardening tooth structure and killing bacteria. Therefore, it can be used to prevent and arrest dental caries. Riva Star (SDF) treatment alone will stop cavities but will not reverse the cavitation. The Silver Modified Atraumatic Procedure, often known as Smart, is the optimum technique for regaining the tooth's structure and function. Glass ionomer was introduced in (1972) as a new material that has become one of the most widely used materials in restorative dentistry. By releasing fluoride ions, this material has a therapeutic impact on the surrounding tooth structure. Microleakage is the ingress of bacteria, its byproducts, toxins, chemicals, oral fluids, and ions between t

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Design of Nonlinear PID Neural Controller for the Speed Control of a Permanent Magnet DC Motor Model based on Optimization Algorithm
...Show More Authors

In this paper, the speed control of the real DC motor is experimentally investigated using nonlinear PID neural network controller. As a simple and fast tuning algorithm, two optimization techniques are used; trial and error method and particle swarm optimization PSO algorithm in order to tune the nonlinear PID neural controller's parameters and to find best speed response of the DC motor. To save time in the real system, a Matlab simulation package is used to carry out these algorithms to tune and find the best values of the nonlinear PID parameters. Then these parameters are used in the designed real time nonlinear PID controller system based on LabVIEW package. Simulation and experimental results are compared with each other and showe

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Design of a Programmable System for Failure Modes and Effect Analysis of Steam-Power Plant Based on the Fault Tree Analysis
...Show More Authors

In this paper, the system of the power plant has been investigated as a special type of industrial systems, which has a significant role in improving societies since the electrical energy has entered all kinds of industries, and it is considered as the artery of modern life.

   The aim of this research is to construct a programming system, which could be used to identify the most important failure modes that are occur in a steam type of power plants. Also the effects and reasons of each failure mode could be analyzed through the usage of this programming system reaching to the basic events (main reasons) that causing each failure mode. The construction of this system for FMEA is dependi

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Chemical Sensor Based on a Hollow-Core Photonic Crystal Fiber
...Show More Authors

In this work a chemical sensor was built by using Plane Wave Expansion (PWE) modeling technique by filling the core of 1550 hollow core photonic crystal fiber with chloroform that has different concentrations after being diluted with distilled water. The minimum photonic bandgap width is.0003 and .0005 rad/sec with 19 and 7 cells respectively and a concentration of chloroform that filled these two fibers is 75%.

View Publication Preview PDF
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Programming a Pneumatic Processes Sequence based on PLC by Demonstration
...Show More Authors

Abstract

Pneumatic processes sequence (PPS) is used widely in industrial applications. It is common to do a predetermined PPS to achieve a specific larger task within the industrial application like the PPS achieved by the pick and place industrial robot arm. This sequence may require change depending on changing the required task and usually this requires the programmer intervention to change the sequence’ sprogram, which is costly and may take long time. In this research a PLC-based PPS control system is designed and implemented, in which the PPS is programmed by demonstration. The PPS could be changed by demonstrating the new required sequence via the user by following simple series of manual steps without h

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref