Preferred Language
Articles
/
jperc-177
Teaching techniques due to the Brain-based learning theory among math teachers
...Show More Authors

The purpose of the study is to identify the teaching techniques that mathematics' teachers use due to the Brain-based learning theory. The sample is composed of (90) teacher: (50) male, (40) female. The results have shown no significant differences between male and female responses' mean. Additionally, through the observation of author, he found a lack of using Brain-based learning techniques. Thus, the researcher recommend that it is necessary to involve teachers in remedial courses to enhance their ability to create a classroom that raise up brain-based learning skills.  

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
New DCT-Based Image Hiding Technique
...Show More Authors

A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.

View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Watermark Based on Singular Value Decomposition
...Show More Authors

Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
Graphical password based mouse behavior technique
...Show More Authors
Abstract<p>This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.</p><p>This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance</p> ... Show More
View Publication
Scopus (12)
Crossref (7)
Scopus Crossref
Publication Date
Sun Apr 02 2017
Journal Name
Journal Of Educational And Psychological Researches
أهم المشاكل الاجتماعية والنفسية المؤدية إلى الإصابة بمرض الزهايمر لدى كبار السن (دراسة ميدانية لعينة من المصابين في مدينة بغداد)
...Show More Authors

The most important social and psychological problems that lead to Alzheimer's disease in the elderly (field study of a sample of people living in the city of Baghdad). The research aims to: 1. Identify the most important social, psychological and health problems of elderly people with Alzheimer's disease. 2. The most prominent solutions and treatments for people living with this disease. 3. rehabilitation and provision of social, psychological and medical services for people with Alzheimer's disease. The research stages of Alzheimer's disease and its symptoms and the most important causes of Alzheimer's disease, research has strengthened the theoretical framework. The theoretical study unexplained social pressure generating dealt with Al

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 19 2018
Journal Name
Arab Science Heritage Journal
مصطلح مصطلح (i3-gal2) في ضوء نصوص مسمارية غير منشورة من عصر سلالة أور الثالثة
...Show More Authors

The verbal formula // i3-gal2 //is a commonly form in the written Sumerian economic texts, starting from the early dynastic period (2900-2372 BC), ending with the Ur III dynasty (2112-2004 BC).  This formula has appeared either without infixes, or accompanied by infixes like / in-da-gal2/,  corresponded in Akkadian the formula: ibaššu ,which is  means "to found, to Storage ", As to the formula / da / come to indicate "to found with, to storage with--).

View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
مجلة القانون المقارن
التكليف الضريبي لحقوق المؤلف في ضوء احكام قانون ضريبة الدخل العراقي رقم 113 لسنة 2007
...Show More Authors

Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
A proposal to impose a tax on the profits of securities trading to increase tax revenues: Applied research in the General Commission of Taxes
...Show More Authors

Abstract:

                The research aims to identify the concept of trading securities in Iraq and to propose a new mechanism for the taxation of trading profits and the extent of its impact on tax revenues, as it was observed that there are professional investors in the trading market and some of them achieve huge annual profits. and this profit should be like other taxable profits. The General Commission of Taxes and in cooperation with the Iraq Stock Exchange should identifying those profits, subjecting them to income tax, and adding them to the tax base. The researcher relied on the use of the descriptive and analytical approach bas

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2011
Journal Name
Iraqi Journal Of Science
Using the band ratio classification method to detect the regions that need to remove sedimentation in Tigris River
...Show More Authors

LandSat Satellite ETM+ image have been analyzed to detect the different depths of regions inside the Tigris river in order to detect the regions that need to remove sedimentation in Baghdad in Iraq Country. The scene consisted of six bands (without the thermal band), It was captured in March ٢٠٠١. The variance in depth is determined by applying the rationing technique on the bands ٣ and ٥. GIS ٩. ١ program is used to apply the rationing technique and determined the results.

View Publication
Publication Date
Wed Sep 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Microleakage of Pit and Fissure Sealants after Using Different Occlusal Surface Preparation Techniques: An In Vitro Study
...Show More Authors

Background: The marginal seal is essential for sealant success because penetration of bacteria under the sealant might allow caries onset or progression. The aim of the present study was to estimate and compare the microleakage of pit and fissure sealant after various methods of occlusal surface preparation. Materials and methods: Thirty non-carious premolars extracted for orthodontic reasons were equally divided into three groups. In group one, occlusal fissures were opened with round carbide bur, in group two, occlusal surfaces of the teeth were cleaned with a dry pointed bristle brush and samples of group three were cleaned with a slurry of fine flour of pumice in water using rubber cup. Then fissures of all teeth were etched using 35% p

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 03 2021
Journal Name
Key Engineering Materials
Comparative Study of Structural Behavior for Asymmetrical Castellated (Concavely - Curved Soffit) Steel Beams with Different Strengthening Techniques
...Show More Authors

The Asymmetrical Castellated concavely – curved soffit Steel Beams with RPC and Lacing Reinforcement improves compactness and local buckling (web and flange local buckling), vertical shear strength at gross section (web crippling and web yielding at the fillet), and net section ( net vertical shear strength proportioned between the top and bottom tees relative to their areas (Yielding)), horizontal shear strength in web post (Yielding), web post-buckling strength, overall beam flexure strength, tee Vierendeel bending moment and lateral-torsional buckling, as a result of steel section encasement. This study presents two concentrated loads test results for seven specimens Asymmetrical Castellated concavely – curved soffit Steel Be

... Show More
View Publication
Scopus (6)
Crossref (4)
Scopus Crossref