Preferred Language
Articles
/
jperc-85
An Instructional Design According to the Active Learning Model and Its Effect on Students' Achievement in Chemistry for Fifth Intermediate Stage
...Show More Authors

The objective of the research is to identify the effect of an instructional design according to the active learning modelsالباحثين in the achievement of the students of the fifth grade, the instructional design was constructed according to the active learning models for the design of education. The research experience was applied for a full academic year (the first & the second term of 2017-2018). The sample consisted of 58 students, 28 students for the experimental group and 30 students for the control group. The experimental design was adopted with partial and post-test, the final achievement test consisted of (50) objectives and essays items on two terms, the validity of the test was verified by the adoption of the Kudorichard equations& Alpha-Cronbach The results showed that there was a statistically significant difference in favor of the experimental group in the variable achievement according to active learning models. Finally, the researcher presented a number of recommendations

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The effect of managerial Process Reengineering on organizational citizenship Applied research on Electronic Industries Company
...Show More Authors

ABSTRACT

The research aims to know the reality of a two examined variables at the organization studied identifying the relationship between managerial processes reengineering and organizational citizenship behavior. The research applied on the Electronic Manufacturing Company encompassing a sample of managers and employees consisted of (100) individuals. A questionnaire is the main instrument for data gathering, which has been included (45) questions as well as personal interviews to support the questionnaire's questions and to achieve greater realism for collecting information.

Answers were analyzed to reach the final results through the use of a number of statistical methods via

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Proposed Introduction to Activate the Role of Accounting System for Political Parties in Iraq
...Show More Authors

     Purpose - The study aimed at evaluating the accounting system of the Iraqi political parties, which is applied according to legislative texts, and then the ability to provide accounting information to evaluate the strategic performance and control of the party's operational and financial performance.
Findings- The research found that the unified accounting system applied to political parties does not provide relevance informations to judge the performance of the political party, the researcher a proposal for an accounting system that provides the necessary information to measure and monitor the performance of Iraqi political parties can be presented. The

... Show More
View Publication
Crossref
Publication Date
Wed Jul 30 2008
Journal Name
College Of Islamic Sciences
Al-Aini's grammatical responses to Ibn Malik in his book Umdat Al-Qari
...Show More Authors

It is from the greatness of God Almighty and from him that he facilitated for me to delve into the immersion of the hadith of the Prophet in my doctoral dissertation, then I found it a fertile ground for the cultivation of scientific results.
Through this work, I chose the topic (Replies of Al-Aini to Ibn Malik in his book Umdat Al-Qari Sharh Sahih Al-Bukhari) because of its scientific impact, as such topics inspire in the soul of the follower and the student a lot of contemplation and great care to understand the texts and then come up with a result that is almost close. It is correct, and my current situation in this research is the condition of many scholars, not without errors and omissions. Whatever was correct is by the grace of

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Medical evidence in matters of proof between Sharia and law: A model
...Show More Authors

Praise be to God, prayer, and peace be upon the Messenger of Allah and his God and his companions. The field of the judiciary to prove or invalidate some cases in the field of proof of descent and attachment to the plaintiff or exile, and other legal and judicial issues, especially in this era where the spread of previously unknown evidence, such as DNA, which was discovered in 1953, and the genetic fingerprint discovered 1984, blood analysis and a Saliva, sweat, poetry, etc. in the field of forensic evidence, in forensic medicine or medical expertise, it can be used to identify the killer, or verify his identity, using all the evidence in the scene, such as a point of blood or sweat, and the like So, as well as to prove the lineage is u

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Political Sciences Journal
The impact of the Turkish intervention in northern Syria on the Syrian Turkish relations during (2011-2019)
...Show More Authors

This study aimed to provide a theoretical framework for the impact of the Turkish intervention in northern Syria and the extent of its impact on the relations between the two countries.

It also sought to answer the study's main question: What is the impact of the Turkish intervention in northern Syria on Turkish-Syrian relations during the period 2011-2019 ?.   

In this study, the historical method, the descriptive method, and the systems analysis method were used, with the aim of arriving at an accurate and realistic understanding of the Turkish-Syrian relations.

The study reached a set of results, the most important of which was that the Syrian-Turkish relations are based on interests, and that all alliances and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
An Environmental Study on Phytoplankton (Diatoms) in Al-Yusifiya River, Iraq
...Show More Authors

An environmental study conducted on diatoms in Al Yusifiya river beyond its branching from Euphrates river. Four sites were selected along the river for the period from march 2013 to September 2013. The present study involved the measurement of physicochemical parameters, also the qualitative and quantities of diatoms. The studied parameters values ranged as follows: 19-44Cº and 16-30 Cº for air and water temperature respectively, 6.9-8.7, 595-1248 µS/cm, 6.4-8.0 mg/l for pH, electric conductivity and dissolved oxygen respectively. A total of 74 taxa were recorded for diatoms, where the pinnate diatom was the predominant and recorded 64 taxa while 10 taxa for centric diatoms. The total number of diatoms was 1197.55*104 cell /l. The tota

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Heliyon
Synthesis and Characterization of Some Metal Ions Complexes with Mixed Ligand of Azo Dye and Metformin and Evaluation of its Effectiveness on the Growth of Some Pathogenic Bacteria Clinically Isolated and Study of its Toxicity on Normal and Cancerous Hepatocytes
...Show More Authors

View Publication
Crossref