Preferred Language
Articles
/
jperc-1645
Cognitive Behavioral Therapy for Internet Addicts
...Show More Authors

The study aims to explore the effect of cognitive behavioral therapy on internet addiction among university students. The experimental method was used. The study population consisted of (100) university students (50 males, 50 females). The Research sample included (13) University students at Baghdad University addicted to the Internet (9 males, 4 females), divided into two groups:  a control group consisting of (6) individuals (4 males, 2 females) and an experimental sample consisting of (6) individuals (4 males, 2 females). The Scale of Internet Addiction by Young (1996), which was translated and modified into the Arabic language by (Moegel and Prism, 2016), was administered to the study sample. The sample was subjected to two sessions per week that lasted for one month and a half, the time of each session was (45) minutes. The results revealed that there are statistically significant differences between the mean scores of the experimental group and the control group before and after applying the treatment program in favor of the post-measurement. The study came out with a set of recommendations and proposals

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
دراسة المتغيرات المؤثرة على زيادة أعداد الحيوانات المنوية النشطة باستخدام نموذج توبت (Tobit Model
...Show More Authors

The no parity problem causes determining is the most interesting case by doctors and researchers in this filed, because it helps them to pre-discovering of it, from this point the important of this paper is came, which tries to determine the priority causes and its fluency, thus it helps doctors and researchers to determine the problem and it’s fluency of increase or decrease the active sperm which fluencies of peregrinating. We use the censored regression (Tobit) model to analyze the data that contains 150 observations may by useful to whom it concern.         

 

 

 

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
دراسة في مصداقية العائد على الاستثمار كمؤشر مالي لأسهم الشركات المدرجة في أسواق البورصة
...Show More Authors

لطالما تُبنى قرارات الاستثمار في أسهم الشركات المدرجة في أسواق البورصة على خلفية المؤشرات المالية لها والتي عادةً مايتم إصدارها في نشرات سنوية معتمدة من قبل تلك الاسواق، إذ غالباً مايقوم المحللون الماليون بالاستعانه بها لتوجيه المستثمرين لإتخاذ القرارات المتعلقة بشراء أو بيع أسهم هذه الشركات.

لكنه على الرغم من ذلك تحدث إنهيارات كبيرة في أسواق البورصة بين فترة وآخرى وخير مثال على ذلك ما أ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 26 2022
Journal Name
جامعة بغداد/ كلية التربية للعلوم الصرفة - ابن الهيثم
برنامج تدريبي قائم على دمج مهارات التفكير المستقبلي مع أنماط التفاعل الصفي وأثره على الكفاءة الذاتية الأكاديمية لمدرسي الرياضيات ومهارات الحل الإبداعي لطلبتهم
...Show More Authors

Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Difficulties toward third level students in the department of Arabic language for both Education for Women College and Ibn Rushd/University of Baghdad for the studying of Arabic language curriculum: Difficulties toward third level students in the department of Arabic language for both Education for Women College and Ibn Rushd/University of Baghdad for the studying of Arabic language curriculum
...Show More Authors

Abstract
The curriculum is amodern science which reflects the social philosophy and
what it needs . It searches for amothod that limits the knowledge that the
indiridual gets in the society and the sorts of the culture that suits the enrironment
in which they live. It also clears for them their history and their great in heritance.
It has a great in flunce in their mental growth ,and it teacher the students new
roles in the thin king ,and training then on what they have learned . According to
there points the problem concentrats on the mostimpotant difficulties which facer
thestudents in studing Arabic langnage text-books
In spite of the great care that the text taker but it is full of subjects and studies
w

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Transylvanian Review
Metacongnitive Thinking Skills Implied in Questions and Activities of Computer Textbook for the Fifth Grade Preparatory
...Show More Authors

The research aims to know the availability of supra-cognitive thinking skills in the questions and activities of the computer book for the fifth grade preparatory scientific and literary branches in Iraq for the academic year 2018/2019, as the researcher has prepared a list of supra-cognitive thinking skills included two areas and (6) key skills and (27) A sub - skill, where by the questions and activities of the aforementioned authors were analyzed. The researcher followed the descriptive analytical approach "method of content analysis", and adopted the explicit and implicit unit of analysis, as was verified the validity and stability of the analysis, and the results showed unevenness and imbalance in the distribution of supra-cognitive th

... Show More
Preview PDF
Publication Date
Thu Jul 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Score for the group 𝓢𝓛(2,38)
...Show More Authors

Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
Future thinking skills for university students
...Show More Authors

The study aimed to identify the future thinking skills of university students and which of these skills are prevalent. The sample of the study consisted of (400) male and female students from the university students. In order to achieve the goals of the research, the researcher built a measure of future thinking skills based on Torrance theory (2003). Psychometric properties of the standards were extracted, which are represented by honesty and consistency and the application of the measures to the research sample. The researchers found that Future thinking skills of university students, and that the skill of future planning is the most common skill among the research sample.

View Publication Preview PDF
Publication Date
Sat Nov 01 2014
Journal Name
I-manager's Journal On Information Technology
AN ENHANCED METHOD FOR SPRITE EXTRACTING
...Show More Authors

The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.

Publication Date
Sun Jan 01 2023
Journal Name
Lecture Notes In Electrical Engineering
Prosthetic Parts for Protecting Mobile Robots
...Show More Authors

View Publication
Scopus Crossref