Preferred Language
Articles
/
jperc-82
Training Program based on Some Strategies of Self-Regulated Learning for the Teachers of Mathematics and its Effect on their Relational Mathematics
...Show More Authors

This research aims at building a proposed training program according to the self-regulated strategies for the mathematics teachers and to identify the effect of this program on relational Mathematics of teachers. The sample of the research was (60) Math teachers; (30) teachers as experimental group and (30) teachers as control group. The results of the current research reacheded that the proposed training program according to some self-managed learning strategies, meets the needs of trainees with remarkable effectiveness to improve the level of their teaching performance to achieve the desired goals. Training teacher according to self-managed learning strategies is effective in bringing about the transition of training to their students in developing their direction towards self-learning. The relative mathematics test was used and reached the following recommendation: Applying the training program to students whom practice math in colleges, and reducing the burden of teaching mathematics among teachers, to reduce the fear of mathematics originally and to increase the efficiency of teaching and learning.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Color image compression based on spatial and magnitude signal decomposition
...Show More Authors

<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 08 2023
Journal Name
مجلة حمورابي للدراسات
adolescents exposure to the specialized satellite channel cartoon network and its relationship to their level of technological culture
...Show More Authors

Publication Date
Fri Dec 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
The Effect of Adding Phosphorus and Zinc Spraying on the Nutrient Content and Root Growth of Cabbage
...Show More Authors
Abstract<p>This study was conducted at the Research Experimental Station of the College of Agricultural Engineering/University of Baghdad in the Al-Jadiriyah area during the autumn season of 2022. The study aimed to investigate the effect of phosphorus addition and zinc spraying on the nutrient content and root growth of the cabbage. The experiment included two factors: the first factor was phosphorus with four concentrations (P25%, P50%, P75%, and P100%) of the recommended complete fertilizer dose (135 kg P2O5 per hectare), and the second factor was zinc spraying with three concentrations (0, 30, and 60 mg.L<sup>-1</sup>) of zinc sulfate (ZnSO<sub>4</sub>). The results showe</p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Feb 20 2024
Journal Name
Aip Conference Proceeding
Evaluation and production of predictive maps on the impact of climate factors on the the land cover for the Baghdad city for the period (1999-2021)
...Show More Authors

The general objective of the research is to better understand changes in land cover and their impact on climatic factors by measuring changes in land cover for the Baghdad city for the period 1999-2021 and evaluating changes in land cover and measuring changes in climatic factors (relative humidity and evaporation). This study from 1999 to 2021 and in two different seasons: the April of the growing season and August the dry season. When using the supervised classification method to determine the differences, the results showed remarkable changes, the study showed the spatial variations in LC from 1999 to 2021 as follows: increase in the vegetation and water bodies during April and decrease this in August while the soil and built up decreas

... Show More
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Accounting measurement of strategic storage in light of government support and its implications for presentation and disclosure / proposed model: an analytical study at the General Company for Grain Trade
...Show More Authors

يؤدي عرض معلومات مضللة او محرفة ضمن القوائم المالية والتي تعد أهم مصادر المعلومات الموثوقة التي يُعول عليها لاتخاذ القرارات السليمة الى عدم قدرتها على عكس نتيجة النشاط والمركز المالي لها او اعمال الوحدة الاقتصادية لتلك الفترات الزمنية بصورة صادقة وعادلة نتيجة لنوعية المعلومات المفصح عنها في القوائم المالية لذلك زاد الاهتمام بتطوير الممارسات المحاسبية لتتضمن افصاحات كافية بغرض اعطائهم صورة صادقة وعادلة

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Iraqi Journal Of Physics
Effect of Organic / Inorganic Gate Materials on the Organic Field-Effect Transistors Performance
...Show More Authors

The choice of gate dielectric materials is fundamental for organic field effect transistors (OFET), integrated circuits, and several electronic applications. The operation of the OFET depends on two essential parameters: the insulation between the semiconductor layer and the gate electrode and the capacitance of the insulator. In this work, the electrical behavior of a pentacene-based OFET with a top contact / bottom gate was studied. Organic polyvinyl alcohol (PVA) and inorganic hafnium oxide (HfO2) were chosen as gate dielectric materials to lower the operation voltage to achieve the next generation of electronic applications. In this study, the performance of the OFET was studied using monolayer and bilayer gate insulators. To mo

... Show More
View Publication Preview PDF
Crossref