The purpose of current study is to analyze the computer textbooks content for intermediate stage in Iraq according to the theory of multiple intelligence. By answering the following question “what is the percentage of availability of multiple intelligence in the content of the computer textbooks on intermediate stage (grade I, II) for the academic year (2017-2018)? The researcher followed the descriptive analytical research approach (content analysis), and adopted an explicit idea for registration. The research tool was prepared according the Gardner’s classification of multiple intelligence. It has proven validity and reliability. The study found the percentage of multiple intelligence in the content of computer textbooks for the in
... Show MoreWellbore instability is one of the most common issues encountered during drilling operations. This problem becomes enormous when drilling deep wells that are passing through many different formations. The purpose of this study is to evaluate wellbore failure criteria by constructing a one-dimensional mechanical earth model (1D-MEM) that will help to predict a safe mud-weight window for deep wells. An integrated log measurement has been used to compute MEM components for nine formations along the studied well. Repeated formation pressure and laboratory core testing are used to validate the calculated results. The prediction of mud weight along the nine studied formations shows that for Ahmadi, Nahr Umr, Shuaiba, and Zubair formations
... Show MoreThe main focus of research is on the nature of applications in the fields of science and technology, particularly nanotechnology. In this paper, a simple, non-toxic, inexpensive, and environmentally friendly green method was used to synthesize TiO2 nanoparticles using the extraction of portulacaria afra plant leaves and TiCl4 as a precursor. The synthesized titanium dioxide nanoparticles were characterized by scanning electron microscopy, atomic force microscopy, X-ray diffraction patterns, Fourier transform infrared spectroscopy, and Brunauer-Emmett-Teller analysis. The SEM image of TiO2 nanoparticles showed a few spherical, non-agglomerated particles. The average diameter of the nanoparticles, ac
... Show MoreThis study is included the preparation of two tetradentate amide-thiol proligands of the general structure [H2Ln], [where; (n = (1–2)]. The ligands [H2L1] and [H2L2] have been prepared from the reaction of the cyclic thioester 2-oxo-1, 4-dithiacyclohexane (compound 1) and 3-chloro-2-oxo-1, 4 dithiacyclohexane (compound 2) with 2-aminomethanepyridine in (1:1) ratio respetively. The reaction was carried out in chloroform at room temperature and under N2 atmosphere. Structural formula of these two ligands have been reported.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreSolar energy has significant advantages compared to conventional sources such as coal and natural gas, including no emissions, no need for fuel, and the potential for installation in a wide range of locations with access to sunlight. In this investigation, heterocyclic derivatives were synthesized from several porphyrin derivatives (4,4',4",4"'-(porphyrin-5,10,15,20-tetrayl) tetra benzoic acid) compound (3), obtained by reaction Pyrrole with 4-formyl benzoic acid. Subsequently, porphyrin derivative-component amides 5a, 5b, and 5c were produced by reacting compound (3) with amine derivatives at a 1:4 molar ratio. These derivatives exhibited varying sensitivities for utilization in solar cells, with compound 5a displaying the highest power
... Show MoreThe research aims to know The Effect Of Flexible Grouping Strategy and Three Step Interview strategy on achievement of the history material among student of the first literary class, The Researcher used the experimental design of the two experimental groups and the control group and with post test, researcher group (a) represent the experimental group taught according the Flexible Grouping Strategy , and Division (c) to represent the second experimental group which studied according Three Step Interview strategy and Division (b ) to represent the control group taught in the traditional method, the number of students (99) students of (33) female students in each division. T
... Show More