The aim of this study is to recognize the influence of model of active thinking in achievement ofeighth grade students andtheir visual thinking in science.The finds of this research show the superiority students of the experimental group who studied the science material by using the active thinking model on the students of the control group who studied by usual method, in the achievement test. Also the finds show that the students of the experimental group are more successful than students of control group in the test of visual thinking, so the two null hypotheses have been rejected. In light of the results of the research, numbers of recommendations were made.
Homosexuality is one of the important topics that have emerged in recent times in the Islamic and Arab world, as the topic was in the past one of the taboos and majorities and one of the topics that arouse disgust and is talked about secretly and practiced secretly as well.But today, with international and organizational support for this anomaly and its misrepresentation under the name of gender once again and gender again. It began to spread in all countries of the world, including Islamic and Arab countries, and with the presence of associations and influential people in the legislative and judicial authorities of countries that protect and defend homosexuals. Writing on this subject has become a necessity and a duty; to warn against the
... Show MoreMeaning letters in Arabic are characterized by the diversity and abundance of their linguistic material, and are also distinguished by their large number and types, to the point that some of them have reached a hundred letters confined to five categories
In this work, oral lesions belong to 17 patients, 7 males and 10 females. Their ages range between 15 and 45 years. Follow up was conducted after one day, 7 days, 14 days, one month, and finally 3 months postoperatively. The study lasted for 1.5 year. Surgical diode laser with wavelength of 810 ± 20 nm, with two power levels of 10 and 15 W were used in contact and in non-contact mode via optical fiber. The postoperative outcome revealed; greater haemostatic capability, dry, sealed wound and noticeable lack in pain sensation
Abstract (Iraq post – war reconstruction strategy: analytical study in fact and future prospects.) There search aims at identifying the causes of internal instability in Iraq from the political ,economic , social and security aspects , to diagnose the imbalance and to work towards finding real solutions to this . The study also aims at identifying the reconstruction proposals to completely eliminate the organizationof the terrorist advocate, as well as to know. theproblem of research lies in the ability of Iraqi political elites to achieve internal stability and to employ reconstruction proposals at all levels . The hypothesis of the research lies in the equation that the process of building stability (political – economic)and (socia
... Show MoreAn accurate assessment of the pipes’ conditions is required for effective management of the trunk sewers. In this paper the semi-Markov model was developed and tested using the sewer dataset from the Zublin trunk sewer in Baghdad, Iraq, in order to evaluate the future performance of the sewer. For the development of this model the cumulative waiting time distribution of sewers was used in each condition that was derived directly from the sewer condition class and age data. Results showed that the semi-Markov model was inconsistent with the data by adopting ( 2 test) and also, showed that the error in prediction is due to lack of data on the sewer waiting times at each condition state which can be solved by using successive conditi
... Show Moreيشهد المسرح الدولي قضايا مستجدة ومستحدثة مثل تعدد الفاعلين من الدول ومن غير الدول وتزايد مساحات نفوذهم وتأثيرهم ،ومن جانب اخر أثرت جائحة كورونا على البيئة والمناخ بشكل ملموس على جوانب عدة. فضلا عن ذلك تأثرت جميع المجتمعات البشرية بالإرهاب والهجمات الالكترونية وغيرها ومن بينها دول والمجتمع الدولي بإفراده مؤسسات وكيان اقتصادي وسياسي وقانوني وأمني وامتداد اثاره واسبابه الكثيرة والمتداخلة وما يثيره من خلق حا
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIn this study, we made a comparison between LASSO & SCAD methods, which are two special methods for dealing with models in partial quantile regression. (Nadaraya & Watson Kernel) was used to estimate the non-parametric part ;in addition, the rule of thumb method was used to estimate the smoothing bandwidth (h). Penalty methods proved to be efficient in estimating the regression coefficients, but the SCAD method according to the mean squared error criterion (MSE) was the best after estimating the missing data using the mean imputation method
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More