The aim of the present research is to construct a model to evaluate the software engineering subject in the third grade department of Computing, in colleges of education. Then, evaluating the software Engineering subject from the view point of staff members by applying the constructed model, and in order to achieve the second aim of the present research the researcher has to find answers to the following questions:- 1. What is the presence of the proposed evaluating model fields, which was prepared by the researcher for the third grade Soft Ware Engineering subject from the view point of staff members? 2. What is the presence of the items for the proposed evaluating model, which was prepared by the researcher for the third grade Soft Ware Engineering subject from the view point of staff members? To achieve the objectives of the research, the researcher used as a population of her research all the department of Computing staff members who taught Soft Ware Engineering subject for the current academic year 2014-2015 and the previous years, as well as the specialist who were presence at the meeting of the sect oral Committee in colleges of education for Iraqi Universities (Baghdad, Al-Mustansiriya, Diyala, Al-Iraqia, ThiQar ,Basrah, Hamdania, and Mosul), Totaling (58)staff members, The researcher has chosen intentionally four universities (Baghdad, al-Mustansiriya, Diyalaand al-Iraqia) to be the sample of her research. The researcher used a descriptive approach, and in order to prepare a list of items that are essential for the evaluating model as a first draft, the researcher has depended on previous studies in the field and on the opinions of (20) experts engaged in teaching distributed in colleges of education at Baghdad and al-Mustansiriya universities, through spreading an open ended questionnaire includes six questions, to propose what is suitable to be included in the evaluating model, The first list included the following six fields The list of items was distributed to a sample of (15), then the researcher gave them enough time to check each item and removing or adding what is suitable for the model to become in its final draft which included (125) items,The researcher followed up with (10) ten experts Delphi style throughout three rounds to reach the final form of the evaluating model, and there was a complete agreement among them ,The researcher applied the evaluating model in its final form among (40) staff members, and giving them enough time to answer. Answers were later analyzed statically by using a number of statistical methods and checked the results using (SPSS),It has been found that staff members agree on the achievement of all of the six evaluating model fields in software engineering subject and an achievement of (115) of the evaluating model items with percentage of (%92),The results showed an achievement of the subject aims and methods of teaching and students evaluation, It showed the marginalization of the applied side and focus on theory in all areas whether aims or content and even teaching methods and activities, evaluation, and the shortage of modernizing and developing the syllables section compatibility with showed few inclinations and interests of students.
المستخلص : هدفت البحث الحالي إلى بناء برنامج التدخل المبكر نموذج مجموعة المهارات الاجتماعية الفورد بيكر على وفق أساليب معرفية سلوكية، والتعرف على اثر البرنامج في خفض التوحد الافتراضي لدى الأطفال والتحقق من هذا الهدف وضعت الباحثة الفرضية الآتية لا توجد فروق ذو دلالة إحصائية بين متوسط رتب درجات أفراد المجموعة التجريبية في التطبيقين القبلي والبعدي على المقياس (CARS2-QPC). وقد اقتصر البحث الحالي على الأطفال من ذوي
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreFaintly continuous (FC) functions, entitled faintly S-continuous and faintly δS-continuous functions have been introduced and investigated via a -open and -open sets. Several characterizations and properties of faintly S-continuous and faintly -Continuous functions were obtained. In addition, relationships between faintly s- Continuous and faintly S-continuous function and other forms of FC function were investigated. Also, it is shown that every faintly S-continuous is weakly S-continuous. The Convers is shown to be satisfied only if the co-domain of the function is almost regular.
This research aims to design a high-speed laser diode driver and photodetector, the result is the
design of the high-speed laser diode driver with a short pulse of 10 ns at 30 KHz frequency and the
delivered maximum pulse voltage is 5.5 mV. Also, its optical output power of the laser diode driver is
about 2.529 mW for the centroied wavelength 1546.7 nm with FWHM of 286 pm and (1270-1610) nm.
The design of the circuit based on bipolar transistor where the input pulse signal is simply generated by
an arduino kit with 15 kHz frequency and then compensated to trigger to small signal amplifier which
was is simply NPN C3355 transistor and the output is a current driver to the laser diode. OptiSystem
software and Electronic
The objective of this study is to determine the extent to which the determinants of organizational support contributed to enhancing the mental status of banking services in a number of banks in Dohuk governorate in order to diagnose the correlation between the perceived organizational support and the mental status of services. Availability in the environment of banks and to enhance the mental position from the point of view of customers as the main hypotheses focused on the nature of the relationship between the dimensions of research among them has been tested these hypotheses using statistical and descriptive methods have been The study concluded that the contribution of organizational support, which is
... Show MoreThe research is based on the basic idea that companies today are moving towards a new trend towards protecting the environment coupled with the increasing wareness of the pollution damage caused by these companies due to their operations and activities in the environment. The two main reasons that led the researchers to choose this subject is the need to adapt the companies themselves in response to successive developments, The great development was that companies moved from the sole economic responsibility of the business to social responsibility by emphasizing socially responsible profit. The problem of research is the knowledge of the availability of the dimensions of the green processing series in Kirkuk Cement Factory The re
... Show MoreObjective:The current study aime to isolate Escherichia colifrom urinary tract infections(UTIs) in many Baghdad hospitals. The study concentrate on phylogenic groups and this was done based on triplex PCRmethod by primers besieged to three genetic markers, chuA, yjaA and TspE4.C2. Evaluate the relationship of phylogenic groups of E. coli isolates with the antibiotic-non sensitive patterns. Methodology:Four hundredof E.coli bacteria isolated from urine samples from five hospitals in Baghdad city include: Ghazi AL-Hariri, Ibin- Al-Beledi , AL-Iskan , AL-Nooman and AL-Yarmoke hospitals. Phylogenetic categorizatio
Occupy public investment spending, a great deal of attention since the thirties of the last century, to play important role in economic and social development process and therefore most of the countries are trying different degree of economic development to the completion of the largest amount of public investment, especially in infrastructure, which is one of the pillars essential to economic development, and in order to maximize utilization of the completion of public investment should focus on achieving efficiency in completion.
The current reality of public projects in Iraq, indicating the absence of several key characteristics that must be provided if these proje
It is certain that marriage has the favor of the continuity of human kind since the Prophet Adam till now. But this important event is threatened by some justifications which lead to its delay or abandonment. In the West, sexual relations, illegal friendships, and disrespect of marriage sacredness lead to this delay. While the reasons behind the delay of marriage in the Arab world refer to high dowries, women go out to work, and the religious and scientific ignorance of the need and importance of marriage. The problem also differs according to the difference between the rural and urban regions. On one hand, we find that early marriage is a necessity in the rural regions; on the other hand, the delay of marriage is a clear and nat
... Show More