This research aims at building a proposed training program according to the self-regulated strategies for the mathematics teachers and to identify the effect of this program on relational Mathematics of teachers. The sample of the research was (60) Math teachers; (30) teachers as experimental group and (30) teachers as control group. The results of the current research reacheded that the proposed training program according to some self-managed learning strategies, meets the needs of trainees with remarkable effectiveness to improve the level of their teaching performance to achieve the desired goals. Training teacher according to self-managed learning strategies is effective in bringing about the transition of training to their students in developing their direction towards self-learning. The relative mathematics test was used and reached the following recommendation: Applying the training program to students whom practice math in colleges, and reducing the burden of teaching mathematics among teachers, to reduce the fear of mathematics originally and to increase the efficiency of teaching and learning.
Abstract:
The research aims to shed light on the Corona pandemic and its repercussions on the global economy in general, and on the activities of Iraqi economic units in particular. It also aims to show the impact of the auditor’s reporting on the effects of the Corona pandemic on economic units and its reflection on the quality of his reporting. To achieve the objectives of the research, the researcher prepared a questionnaire according to the five-point Likert scale and took into account in its preparation compatibility with the characteristics of the study community, and that the target community for this questionnaire are the economic units listed in the Iraq Stock Exchange that have complet
... Show More
ABSTRACT
A field experiment was carried out in the fields of the college of agricultural engineering sciences, university of Baghdad during the fall season of 2021, in order to find out which of the cultivated genotypes of maize are efficient under nitrogen fertilization. The experiment was applied according to a RCBD (split plot design with three replications). The genotypes of experiment (Baghdad, 5018 and Sarah) and supplying three levels of nitrogen fertilizer, which are N1 (100 kg/ha), N2 (200 kg/ha) and N3 (300 kg/ha), the results of the statistical analysis are showed the superiority of the cultivar Sarah in the trait of number of days until 50% silking, chlorophyll
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreThe long healing time of bone after tooth extraction in order to construct artificial teeth is uncomfortable to the patient because of aesthetic or masticatory problems in addition to the daily visit to dental clinic. The objective of this study was to evaluate the effect of 805 nm diode laser with long time intervals on repair of bone and skin incisions in rabbits through biochemical, radiological and histological findings. Eighteen New-Zealand rabbits were undergone surgical operations to make a cavity in the bone of the lower jaw, the rabbits were divided into two groups:- Group A (control group) containing nine rabbits. Group B (lased group) containing nine rabbits in which two cavities were done, one on the right side and the other
... Show MoreFire incidences are classed as catastrophic events, which mean that persons may experience mental distress and trauma. The development of a robotic vehicle specifically designed for fire extinguishing purposes has significant implications, as it not only addresses the issue of fire but also aims to safeguard human lives and minimize the extent of damage caused by indoor fire occurrences. The primary goal of the AFRC is to undergo a metamorphosis, allowing it to operate autonomously as a specialized support vehicle designed exclusively for the task of identifying and extinguishing fires. Researchers have undertaken the tasks of constructing an autonomous vehicle with robotic capabilities, devising a universal algorithm to be employed
... Show More