Preferred Language
Articles
/
jperc-165
The effectiveness of educational design design according to the theory of Ozbal in the acquisition of geographical concepts among the pupils of the fourth primary in the geography and development of their habits of mind
...Show More Authors

Summary The objective of the research is to learn the design of a learning educational learning according to the theory of Ausubel in the acquisition of geographical concepts among the students of the fourth primary in the field of geography and the development of their habits of mind. To achieve this, the researcher relied on the two hypotheses the researcher used the design of equal groups the first experimental group was studied according to the design educational educational learning according to the theory and the other is an officer according to the traditional method. The research community consists of fourth grade pupils in primary school day for girls in the Directorate of Education Baghdad, Al-Rusafa, the third academic year 2015-2016. The research sample included (51) where the school of Abdullah bin Abbas represented the experimental group and the number of its students was 25 students. The new generation school was represented by the group of officers and the number of its pupils was 26 pupils. The school consisted of two elementary schools that were deliberately chosen from among the original community schools, Abdullah bin Abbas and the new generation. The researcher prepared a first test to measure the acquisition of concepts included 20 paragraphs of the type of multiple choice and the second measure of the measurement of the habits of the mind consists of (50 paragraphs) distributed on (16) usually and after the statistical treatment with data using the test For two independent samples, the results were as follows: 1 - The pupils of the experimental group that studied the design of learning educational learning according to the theory of Ausubel students in the control group, which studied the usual way to acquire concepts 2 - The superiority of the students of the experimental group studied the design of learning educational learning according to the theory of Ausubel students in the control group in the habits of the mind 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
A study on predicting crime rates through machine learning and data mining using text
...Show More Authors
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o</p> ... Show More
View Publication
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Bayesian Tobit Quantile Regression Model Using Double Adaptive elastic net and Adaptive Ridge Regression
...Show More Authors

     Recently Tobit  Quantile Regression(TQR) has emerged as an important tool in statistical analysis . in order to improve the parameter estimation in (TQR) we proposed Bayesian hierarchical model with double adaptive elastic net technique  and Bayesian hierarchical model with adaptive ridge regression technique .

 in double adaptive elastic net technique we assume  different penalization parameters  for penalization different regression coefficients in both parameters λ1and  λ, also in adaptive ridge regression technique we assume different  penalization parameters for penalization different regression coefficients i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 12 2012
Journal Name
Pramana
Nucleon momentum distributions and elastic electron scattering form factors for some 1p-shell nuclei
...Show More Authors

View Publication
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Al-khwarizmi Engineering Journal
Citric Acid Production: Raw Material, Microbial Production, Fermentation Strategy and Global Market: Critical Review
...Show More Authors

Citric acid is an essential ingredient for the manufacture of (12) key industrial chemicals. Citric acid use is increasing steadily with a high annual growth rate as a result of the development of ever more sophisticated applications. Citric acid is widely utilized in the food and pharmaceutical industries due to its low toxicity when compared to other acidulous. Other uses for citric acid can be found in cleaning supplies and detergents. Based on information from a review of the literature, Citric acid production substrates and methods for surface fermentation, submerged fermentation, solid-state fermentation, and international market expansion are all covered in the current review study. Finally, there is still much to learn about the

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Sun Jun 30 2013
Journal Name
Al-khwarizmi Engineering Journal
Al-Khriet Agricultural Waste Adsorbent, for Removal Lead and Cadmium Ion from Aqueous Solutions
...Show More Authors

The availability of low- cost adsorbent namely Al-Khriet ( a substance found in the legs of Typha  Domingensis) as an agricultural waste material, for the removal of lead and cadmium from aqueous solution was investigated. In the batch tests experimental parameters were studied, including adsorbent dosage between (0.2-1) g, initial metal ions concentration between (50-200) ppm (single and binary) and contact time (1/2-6) h. The removal percentage of each ion onto Al-Khriet reached equilibrium in about 4 hours. The highest adsorption capacity was for lead (96%) while for cadmium it was (90%) with 50 ppm ions concentration, 1 g dosage of adsorbent and pH 5.5. Adsorption capacity in the binary mixture were reduce at about 8% for lead a

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Compared with Genetic Algorithm Fast – MCD – Nested Extension and Neural Network Multilayer Back propagation
...Show More Authors

The study using Nonparametric methods for roubust to estimate a location and scatter it is depending  minimum covariance determinant of multivariate regression model , due to the presence of outliear values and increase the sample size and presence of more than after the model regression multivariate therefore be difficult to find a median location .       

It has been the use of genetic algorithm Fast – MCD – Nested Extension and compared with neural Network Back Propagation of multilayer in terms of accuracy of the results and speed in finding median location ,while the best sample to be determined by relying on less distance (Mahalanobis distance)has the stu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Strengthening and Closing Cracks for Existing Reinforced Concrete Girders Using Externally Post-Tensioned Tendons
...Show More Authors

This research is devoted to study the strengthening technique for the existing reinforced concrete beams using external post-tensioning. An analytical methodology is proposed to predict the value of the effective prestress force for the external tendons required to close cracks in existing beams. The external prestressing force required to close cracks in existing members is only a part from the total strengthening force.
A computer program created by Oukaili (1997) and developed by Alhawwassi (2008) to evaluate curvature and deflection for reinforced concrete beams or internally prestressed concrete beams is modified to evaluate the deflection and the stress of the external tendons for the externally strengthened beams using Matlab

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 25 2021
Journal Name
Caai Transactions On Intelligence Technology
Shoulder girdle recognition using electrophysiological and low frequency anatomical contraction signals for prosthesis control
...Show More Authors

View Publication Preview PDF
Scopus (14)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref