على الرغم من إن الابداع والمبدعين وخصائصهم العقلية والشخصية تعد من المفاهيم المهمة والشائعة في الحياة بمجالاتها كافة، ففي الوقت الذي نجد فيه العديد من الدراسات والمقالات العربية والاجنبية التي تناولته بشكل او باخر، لكنها جميعها اعتمدت على المقياس الخاص بالتفكير الابداعي لمؤسسه الاول تورانس منذ عام (1967)، متجاهلة التغيير والتطور المعلوماتي ولا سيما في الانترنيت والحاسوب وما افرزه هذا من مفردات شاعت وتداولتها الاوساط جميعها، فقد تحسست الباحثة مشكلة عدم وجود اختبار للتفكير الإبداعي بمستوى تفكير طلبة الجامعة في عصرهم ومتغيراته السريعة هذه على البيئة العراقية وتحديدا في الوقت الحاضر والظروف الاستثنائية التي يعيشها العراقيون عامة وطلبة الجامعة بشكل خاص، لذلك استهدف البحث الحالي بناء اختبار للقدرة على التفكير الابداعي اللفظي بمفردات حديثة تتلاءم مع ما يتداوله طلبة الجامعة من مفردات فيما بينهم، يسهم في الكشف عن المبدعين منهم، كمهمة اساسية من مهمات القائمين في مجال القياس النفسي والتربوي اولا ، والوصول الى اداة قياس بخصائص سايكومترية جيدة تقيس وتشخص المبدعين في مجالات حياتهم الدراسية الجامعية الاعتيادية ثانيا.
ولتحقيق هذا الهدف فقد تم العمل على اساس اختبار تورانس للتفكير الابداعي اللفظي المعرب من قبل سيد خير الله (1981)، لكن بمفردات حديثة اذ اعدت الباحثة استبانة للاسئلة والمفردات بواقع (6) اسئلة و(37) مفردة وعرضتها على (8) محكمين لبيان صلاحيتها وتحليلها منطقيا، وحصلت على نسبة اتفاق من (75-80%) على (5) اسئلة ب(23) مفردة مثلت الاختبارات الفرعية الاساسية لاختبار التفكير وهي ( الاستعمالات، والمترتبات، والمواقف، والتطوير والتحسين، والتداعي).
ثم بدات بخطوات البناء من تجربة التحليل الاحصائي اذ تم اختيار عينة عشوائية لغرض تجربة تحليل الفقرات بلغت (115) طالبا وطالبة من بعض الاقسام العلمية والانسانية في جامعة بغداد، واستخرج صدق الفقرات من علاقة درجات الاختبارات الفرعية للاختبار، بالدرجة الكلية للاختبار كلا، باستعمال معامل ارتباط بيرسون وكانت دالة جميعها.
ثم استخرج صدق وثبات المقياس :
اذ استخرج الصدق العاملي بحساب مصفوفة ارتباطات الاختبارات الفرعية الخمسة للمقياس ودلالة تشبعاتها الذي يشير الى انها يجب إن تزيد عن (0,30) لتكون دالة بحسب معيار كايزر لدلالة الصدق العاملي، وكانت جميعها دالة.
اما ثبات المقياس فقد حسب بطريقتين، طريقة "التجزئة النصفية" المصحح بمعادلة "سبيرمان براون" وبلغت قيمته (0,7395) للمقياس كلا، واستخرج كذلك الثبات لارتباط التجزئة النصفية المصحح بمعادلة "هورست" بين جزاي الاختبار غير المتساويين وبلغت قيمته بعد التصحيح (0,6583)، وبذلك تحقق للمقياس خصائص سيكومترية جيدة تجعله مهيا للتطبيق وتشخيص المبدعين.
وفي الختام اوصت الباحثة توصيات عدة واقترحت دراسات اخرى تخدم العاملين والباحثين في المجال .
Highlights the role of taxes in being a major source of funding sources internal economic and social development, and then, any decrease in tax revenue caused by tax evasion, for example, would weaken the government's ability to finance their investments and core financing private sector investment as a result of reduced ability to increase their reserves's cash banks, as well as the weakening of the effectiveness of tax evasion taxes as a tool to guide economic activity in the framework of service for development, and to achieve justice. And the statement of the reasons for and methods of evasion mandated to pay the tax due on them, whether legitimately or illegal with the statement of the proposed methods to tackle tax evasion and elimina
... Show MoreThe design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program
... Show MoreHighlights the role of taxes in being a major source of funding sources internal economic and social development, and then, any decrease in tax revenue caused by tax evasion, for example, would weaken the government's ability to finance their investments and core financing private sector investment as a result of reduced ability to increase their reserves's cash banks, as well as the weakening of the effectiveness of tax evasion taxes as a tool to guide economic activity in the framework of service for development, and to achieve justice. And the statement of the reasons for and methods of evasion mandated to pay the tax due on them, whether legitimately or illegal with the statement of the proposed methods to tackle tax evasion and elim
... Show MoreA novel median filter based on crow optimization algorithms (OMF) is suggested to reduce the random salt and pepper noise and improve the quality of the RGB-colored and gray images. The fundamental idea of the approach is that first, the crow optimization algorithm detects noise pixels, and that replacing them with an optimum median value depending on a criterion of maximization fitness function. Finally, the standard measure peak signal-to-noise ratio (PSNR), Structural Similarity, absolute square error and mean square error have been used to test the performance of suggested filters (original and improved median filter) used to removed noise from images. It achieves the simulation based on MATLAB R2019b and the resul
... Show MoreThis paper contains an equivalent statements of a pre- space, where are considered subsets of with the product topology. An equivalence relation between the preclosed set and a pre- space, and a relation between a pre- space and the preclosed set with some conditions on a function are found. In addition, we have proved that the graph of is preclosed in if is a pre- space, where the equivalence relation on is open.
On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that
... Show MoreSteganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.
With the growing use of electronic commerce has worked many companies, especially public shareholding to take advantage of them treated in the trade, so that the e-commerce part of the corporate environment, and this has made a career of accounting and auditing facing new challenges to the sophistication of the information and the rapid growth in the market for electronic commerce. And raised many questions about the ability of the audit profession to facing these challenges and how to audit operations of e-commerce and how to give confidence on websites, this sense it has become necessary keep the internal control systems of this technology and what has caused changes to the accounting system, and evolve to fit the developments that hav
... Show MoreAcceptable Bit Error rate can be maintained by adapting some of the design parameters such as modulation, symbol rate, constellation size, and transmit power according to the channel state.
An estimate of HF propagation effects can be used to design an adaptive data transmission system over HF link. The proposed system combines the well known Automatic Link Establishment (ALE) together with variable rate transmission system. The standard ALE is modified to suite the required goal of selecting the best carrier frequency (channel) for a given transmission. This is based on measuring SINAD (Signal plus Noise plus Distortion to Noise plus Distortion), RSL (Received Signal Level), multipath phase distortion and BER (Bit Error Rate) fo
... Show Moreعرض كتاب على خط النار مذكرات الرئيس الباكستاني