This study has came as a result to discover on the references of the educational theories which leads the professors in the educational art departments in the Iraqi universities through knowing these ideological references indeed in an important slice of the society. This slice is: the members of professoriate. The study goal knows the ideological references to these theories for the professors in these departments.
In order to approve the research's goals. The researcher has selected a sample contains (50) professoriate members in these departments in the Iraqi universities which they have the educational art profession among the next scientific degrees (assistant teacher. teacher. assistant professor & professor).
The resea
Big data of different types, such as texts and images, are rapidly generated from the internet and other applications. Dealing with this data using traditional methods is not practical since it is available in various sizes, types, and processing speed requirements. Therefore, data analytics has become an important tool because only meaningful information is analyzed and extracted, which makes it essential for big data applications to analyze and extract useful information. This paper presents several innovative methods that use data analytics techniques to improve the analysis process and data management. Furthermore, this paper discusses how the revolution of data analytics based on artificial intelligence algorithms might provide
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show MoreIn this paper, an algorithm for reconstruction of a completely lost blocks using Modified
Hybrid Transform. The algorithms examined in this paper do not require a DC estimation
method or interpolation. The reconstruction achieved using matrix manipulation based on
Modified Hybrid transform. Also adopted in this paper smart matrix (Detection Matrix) to detect
the missing blocks for the purpose of rebuilding it. We further asses the performance of the
Modified Hybrid Transform in lost block reconstruction application. Also this paper discusses
the effect of using multiwavelet and 3D Radon in lost block reconstruction.
This study evaluates the performance of magnetic abrasive finishing (MAF) of aluminum alloy in terms of achieving materials removal (MR). A vertical milling machine is used to perform the finishing process using a developed MAF unit that consists of an inductor made out of a 150 mm long and 20 mm diameter iron core wound with 1500 turns and 0.5 mm copper wire. The commutator and magnetic pole are attached at the top and bottom of the inductor, respectively. The required current is supplied using a DC power supply. The South Pole workpiece is a 100×50×3 mm3 plate of AA 1100 aluminum alloy, whereas the magnetic pole represented the North Pole. Pole rotational speed, applied current, and abrasive finishing time was selected as
... Show MoreRecent developments in two main phases of cumulus cloud studies are discussed; first the relations between the clouds and their energy sources in the subcloud layer and second, the interaction between the clouds and their environment in the cloud layer. Under the first heading, the various originating impulses for cumulus formation are mentionitd. and how the character of this impulse affects the spacing, scale and temperature structure of the clouds. The possible origins of trade cumuli are considered.
Abstract
Digital repositories are considered one of the integrated collaborative educational environments that help every researcher interested in developing the education and educational process. The learning resources provided by the repositories are suitable for every researcher, so digital information can be stored and exchanged by ensuring the participation and cooperation of researchers, teachers, and those who are interested, as well as curricula experts, teachers, and students, to exchange each other’s experiences in constantly updating that information as a reason for developing their performance in education. This reveals the importance of the role of educational digital institutions by providing and
... Show MoreThe Ethanolic extracts of different Iraqi indigenous plants which belong to different families showed algicidal activity against Anabaena, Nostoc and Myxosarcina species. Peganum harmala extract was the most potent in controlling the growth of tested Cyanobacterial species
سمير خلف فياض * و محسن طالب د.نوال عزت عبد اللطيف*, مجلة الهندسة والتكنولوجيا, 2010