Preferred Language
Articles
/
jperc-305
The impact of the model and follows on the collection and Retention of fifth grade students (oiterary) in history
...Show More Authors

The first chapter the importance of research and need for education scientists see that the roots of the use of a specimen Wheatley in learning and teaching back to Grayson Wheatley, one of the largest supporters of a modern construction, which lay the groundwork for the specimen stage and the form in which it is. That was attributed to him, often called his name called while some educators based learning strategy on the issue. He sees the learner in this model make him a meaningful understanding of problems during his progress, thereby acting with his colleagues to find solutions to them in small groups. He

        Borders Search: Search by students is determined by the current fifth grade (literary) in high school and junior high in Baghdad governorate / center

        Chapter II of Arab studies and foreignStudies on the model followed in the collection and retention

        Chapter III experimental design: researcher determined experimentally adopted a two experimental and control group

Rewarded researcher b prior knowledge test,

Research tools to prepare for the test after the collection of statistical procedures in terms of difficulty and discrimination

After the completion of the requirements of the experiment, the search experience began on Sunday, 08.10.2014 dish and post test to acquire a historical concepts Wednesday, 12/17/2013, and thus the search experience ended in the retention test article after (21) days from the end of the experiment

        Chapter IV presented in this chapter the researcher's findings on according to objective research and hypotheses rejected FrdahseatThe results showed that there are significant differences between the two groups differences degrees students

Conclusions

- The specimen is followed by a new strategy led to increased attention and looking forward to the students of history, and increased the desire to know the course material and prepare them for her

Recommendations

 - Encourage and train  students on the specimen is followed and get them used

Proposals

similar study procedures for various stages of the variable sex-

- study reveals the impact of a prototypical followed on critical and creative thinking

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jul 28 2023
Journal Name
Journal Of Optics
Estimated the nanoparticles size of CdS from UV–Vis spectrum absorption by effective mass approximation model (EMA) using capping and complex agent
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 10 2017
Journal Name
Al-academy
Tradition and modernity in the designs and fabrics fashion gowns Islamic
...Show More Authors

The importance of the heritage of the Iraqi heavy symbolism and connotations where contacted habits rights and beliefs from antiquity to the present, in addition to being represented with data aesthetic it is an expression philosophical concepts associated implications incentives cultural aesthetic of the content of the intellectual including contents of semantics and symbols and the dimensions of the meanings Sayings , to turn form a legacy popularly moving window to communicate worth studying its details and search function on the character and identity and origins . Where have emerged in recent years, a phenomenon characterized by inventing new designs by modernist styles that have entered into technical system design and effectivenes

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 03 2018
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Condition assessment and rehabilitation for trunk sewer deterioration based on Semi-Markov model
...Show More Authors

An accurate assessment of the pipes’ conditions is required for effective management of the trunk sewers. In this paper the semi-Markov model was developed and tested using the sewer dataset from the Zublin trunk sewer in Baghdad, Iraq, in order to evaluate the future performance of the sewer. For the development of this model the cumulative waiting time distribution of sewers was used in each condition that was derived directly from the sewer condition class and age data. Results showed that the semi-Markov model was inconsistent with the data by adopting ( 2 test) and also, showed that the error in prediction is due to lack of data on the sewer waiting times at each condition state which can be solved by using successive conditi

... Show More
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Dec 09 2020
Journal Name
Banks And Bank Systems
Cooperative decision-making on fiscal and monetary policy in Iraq using the prisoner’s dilemma
...Show More Authors

This paper investigates the interaction between fiscal and monetary policy in Iraq after 2003 using the prisoner’s dilemma.The paper aims to determine the best form of coordination between these policies to achieve their goals; payoff matrix for both policies was constructed. To achieve the purpose, the quantitative approach was applied using several methods, including regression, building payoff matrices and decision analysis using a number of software.The results of the monetary policy payment function show that inflation rate has an inverse relationship with the auctions of selling foreign currency and a positive relationship with the government’s activity, while the fiscal policy function shows that real growth is positively

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 01 2008
Journal Name
Journal Of Educational And Psychological Researches
التعلم التعاوني وأثره على التحصيل والاتجاه نحو الحاسب الآلي عند طلبة كلية التربية بجامعة بغداد
...Show More Authors

هدفت هذه الدراسة إلى مقارنة أثر أسلوب التعلم التعاوني بالأسلوب التقليدي في التحصيل الدراسي، وعلاقته بالاتجاه نحو الحاسب الآلي عند طلبة كلية التربية بجامعة بغداد خلال دراستهم لمقرر الحاسب الآلي وقد تضمنت إجراءات الدراسة استخدام الأسلوب التجريبي، وذلك بتوزيع أربع شعب دراسية على مجموعتين: "مجموعة تجريبية" يتم تدريسها باستخدام أسلوب التعلم التعاوني، والمجموعة الثانية: "مجموعة ضابطة" يتم تدريسها بالطريق

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 30 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Adoption of the IFRS11 Financial Reporting Standard for Oil Service Contracts Costs and its Reflection on Measurement and Disclosure for National Oil Companies: بحث تطبيق في شركة نفط ميسان (ش . ع)
...Show More Authors

The research seeks to clarify the problems related to the aspects of the financial and accounting process resulting from entering into contractual arrangements with a period of more than 20 years, among which is the research problem represented by the lack of clarity of the foundations and procedures for the recognition of oil costs and additional costs borne by foreign invested companies, which led to a weakening of their credibility and reflection. Negatively "on the measurement and accounting disclosure of financial reports prepared by oil companies, and the research aims to lay down sound procedures for measuring and classifying oil costs and additional costs paid to foreign companies, and recognizing and recording them in th

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 12 2020
Journal Name
Al-khwarizmi Engineering Journal
Optimization the Effect of Electrode Material Change on EDM Process Performance Using Taguchi Method
...Show More Authors

Electrical Discharge Machining (EDM) is a widespread Nontraditional Machining (NTM) processes for manufacturing of a complicated geometry or very hard metals parts that are difficult to machine by traditional machining operations. Electrical discharge machining is a material removal (MR) process characterized by using electrical discharge erosion. This paper discusses the optimal parameters of EDM on high-speed steel (HSS) AISI M2 as a workpiece using copper and brass as an electrode. The input parameters used for experimental work are current (10, 24 and 42 A), pulse on time (100, 150 and 200 µs), and pulse off time (4, 12 and 25 µs) that have effect on the material removal rate (MRR), electrode wear rate (EWR) and wear ratio (WR). A

... Show More
View Publication Preview PDF