Following model educational offenders in collection and Alasbaka of fifth grade students preparatory in history A. M. Dr Prepared by: Dr. Bashaer Mawloud Tawfeeq, The Center of Educational and Psychological Studies Baghdad University - There is no difference statistically significant at the 0.05 level of significance between the average scores of the following students studying using model and offenders and who are studying in the usual manner (traditional) in the collection - There is no difference statistically significant at the 0.05 level of significance between the mean scores for the following students studying using model and offenders and who are studying in the usual manner (traditional) in retention Find limits: Current search is determined by students fifth grade preparatory (literary) in day secondary schools in the province of Baghdad Center Determine the terms of the survey model and offenders, collection, retention Chapter II Previous studies have addressed the model and offenders with the collection and retention Chapter III First: the experimental design: the researcher adopted experimentally determined The two experimental groups and a control group and achievement test after me Second: The students preparatory fifth (literary) in day secondary schools in Baghdad city center / for the academic year 2012-2013 Third: distributed randomly on the two sets of people search to the first representation of the experimental group (Division) Division represents the control group. The number of female students after Astied the female students Alraspat to the previous year Researcher rewarded variables (degrees of history, intelligence test, the previous information in history Researcher drafted (35) behaviorally goal depending on the general goals and content-delivery history topics examined in the experiment spread over the first three levels of the cognitive domain of Bloom's Taxonomy (knowledge, comprehension, application) Researcher prepared a test to measure the achievement of Formation (35) paragraph of multiple-choice, the researcher used a number of means, including statistical (ANOVA, difficult equation and excellence paragraph, the Pearson correlation coefficient, Spearman equation - Brown Chapter IV Presented in this chapter researcher's findings in accordance with the goal of research and hypotheses (rejected hypotheses and the results showed that there were statistically significant differences between the scores of the two students Conclusions In light of the findings of current research can be concluded as follows: Preference model Janneh on the usual way of teaching history at the fifth grade students preparatory and which was reflected by raising level mode and retention of information Recommendations: In light of the findings and conclusions reached by the researcher can go out the following recommendations: - Emphasis on the educational model Janneh in the teaching of history in middle school because of its role in achieving the objectives of teaching history to raise the level of the collection and retention of information Numbers of teachers, which makes them able to teach according to modern models in the teaching of history Proposals : An update of the current research suggests the researcher conducting the following studies A similar study of the current study in another subsidiary variables such as critical thinking or direction towards the article,Following model educational offenders in collection and Alasbaka of fifth grade students preparatory in history
Protection of the oil pipelineswhich extracted from the wells was found to shut the well and prevent the leakage of oil when broken using safety valve. This valve is automatically activated by loss of pressure between the well and pipelines, which take the pressure, signal from hydraulic pressure sensor through pressure control valve which has constant or variable value but it is regulated manually. The manual regulatory process requires the presence of monitoring workers continuously near the wells which are always found in remote areas. In this paper, a smart system has been proposed that work with proportional pressure control valve and also electronic pressure sensor through Arduino controller, which is programmed in a way that satisfie
... Show MoreThis study investigates the implementation of Taguchi design in the estimation of minimum corrosion rate of mild-steel in cooling tower that uses saline solution of different concentration. The experiments were set on the basis of Taguchi’s L16 orthogonal array. The runs were carried out under different condition such as inlet concentration of saline solution, temperature, and flowrate. The Signal-to- Noise ratio and ANOVA analysis were used to define the impact of cooling tower working conditions on the corrosion rate. A regression had been modelled and optimized to identify the optimum level for the working parameters that had been founded to be 13%NaCl, 35ᴼC, and 1 l/min. Also a confirmation run to establish the p
... Show MoreIn this work Laser wireless video communication system using intensity modualtion direct
detection IM/DD over a 1 km range between transmitter and receiver is experimentally investigated and
demonstrated. Beam expander and beam collimeter were implemented to collimete laser beam at the
transmitter and focus this beam at the receiver respectively. The results show that IM/DD communication
sysatem using laser diode is quite attractive for transmitting video signal. In this work signal to noise
ratio (S/N) higher than 20 dB is achieved in this work.
Background: Extracorporeal Shock wave lithotripsy (ESWL) is widely used in treating patients with ureteralstones because it is effective, safe, and noninvasive. Based on factors such as size and the location of stones,there is a significant variation in the overall stone-free rate (SFR).Aim of the study: To evaluate the effect of ureteral wall thickness (UWT), stone attenuation, the time fromfirst attack of pain till first session of ESWL and stone/ rib density on the outcome of SWL in the treatmentof upper ureteral stones (UUS).Patient and methods: A prospective study when 127 patients with radio-opaque UUS ranging from 7 to 20mm and treated by ESWL were included in this study. The effect of (stone/ 12th rib) density by KUB, ureter
... Show MoreThe extract of fig fruit has shown significant medical usefulness in various fields. The entrance of nanotechnology into the field of medicinal and pharmacology has shown remarkable advantages. Plants contain diverse molecules thatcan reduce metals, and provide a safe, eco-friendly approach for synthesizing nanoparticles. Iron oxide nanoparticles (IONPs) have been reported to possess an antimicrobial effect against some strains of bacteria and moulds. We have aimed to synthesize IONPs from fig fruit extract and investigate the influence of fig extract and IONPs in wound healing of mice. UV-Vis spectroscopy, X-ray diffraction (XRD), and field emission scanning electron microscopy were used to characterize the IONPs that were produced
... Show MoreAn experimental study was carried out to improve the surface roughness quality of the stainless steel 420 using magnetic abrasive finishing method (MAF). Four independent operation parameters were studied (working gap, coil current, feed rate, and table stroke), and their effects on the MAF process were introduced. A rotating coil electromagnet was designed and implemented to use with plane surfaces. The magnetic abrasive powder used was formed from 33%Fe and 67% Quartz of (250µm mesh size). The lubricant type SAE 20W was used as a binder for the powder contents. Taguchi method was used for designing the experiments and the optimal values of the selected parameters were found. An empirical equation representing the r
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More