The purpose of current study is to analyze the computer textbooks content for intermediate stage in Iraq according to the theory of multiple intelligence. By answering the following question “what is the percentage of availability of multiple intelligence in the content of the computer textbooks on intermediate stage (grade I, II) for the academic year (2017-2018)? The researcher followed the descriptive analytical research approach (content analysis), and adopted an explicit idea for registration. The research tool was prepared according the Gardner’s classification of multiple intelligence. It has proven validity and reliability. The study found the percentage of multiple intelligence in the content of computer textbooks for the in
... Show MoreAnalysis system of sports players is very important for individuals in weightlifting. Assessment of player and strength is important for the performance of weightlifting. This paper proposes an analytical method for weightlifters with check-by-frame video. This analysis system can compute the major steps of seven positions in both snatch and clean and jerk methods in frame-video weightlifting monitoring of movements. Each user can compute the major steps of the seven positions of Hu moments among two frames in the video during training, and the Euclidian distance can be computed for the Hu moment values and lifting moment values in the snatch and clean and jerk methods during training. The outcome of the proposed system shows on efficien
... Show MoreWellbore instability is one of the most common issues encountered during drilling operations. This problem becomes enormous when drilling deep wells that are passing through many different formations. The purpose of this study is to evaluate wellbore failure criteria by constructing a one-dimensional mechanical earth model (1D-MEM) that will help to predict a safe mud-weight window for deep wells. An integrated log measurement has been used to compute MEM components for nine formations along the studied well. Repeated formation pressure and laboratory core testing are used to validate the calculated results. The prediction of mud weight along the nine studied formations shows that for Ahmadi, Nahr Umr, Shuaiba, and Zubair formations
... Show MoreThe aim of this research is to identify the availability of visual thinking skills in the chemistry textbook scheduled for the third intermediate grade for the academic year (2020-2021) in the Republic of Iraq. The study sample consisted of all (85) images contained in the chemistry course for the third intermediate grade, which are (85) form using the curriculum. Analytical descriptive A list of visual thinking skills was prepared, and the unit of form was adopted as a unit of analysis and repetition as a unit of counting, and frequencies and percentages were used for statistical treatment, and validity and reliability were calculated. And using the Holste equation. The following results were reached: The skill
... Show Morethere is a need to use the teardown Technique in a various fields and different motives and used often by economic units as a technique to help other techniques for example, used by some economic units for the analysis of other economic units of products in order to work on the development of products and look for opportunities to improve product quality and avoid product errors competitor or reduce its costs, in addition to the services provided by quality control is used ISO 17025 integration with unassembled analysis to adjust the quality of the product by comparing the pieces produced with designed models that are also the product as a whole compared with the original design
... Show MoreABSTRACT Background: Generally, the facial esthetics depends on the esthetic appearance of the maxillary anterior teeth. The purposes of this study were to analyse the macro-aesthetic appearance of the face and the micro-aesthetic appearance of the maxillary anterior teeth to establish the normative values for class I normal occlusion and to detect possible gender differences. Materials and methods: The sample consisted of 120 Iraqi adults (60 males and 60 females) aged (18-23) years. Each individual was clinically examined, then with cephalostat based head position, extraoral and intraoral photographs were taken for each subject. The facial and dental measurements were measured using AutoCad program 2014. Descriptive statistics was obtaine
... Show MoreObjectives: To study the prevalence of rs1799964 (-1031 T/C) and rs361525 (- 238 G/A) SNPs and their effect on the disease activity, severity, and cytokines production in newly diagnosed Iraqi rheumatoid arthritis patients. Patients and Methods: sixty-three patients were diagnosed by a specialist physician while attending the rheumatology unit and twenty control participated. The inflammatory markers were measured and PCR amplification and sequencing were performed to demonstrate TNF-α SNPs. Results: Regarding (-1031 C/T) SNP, the TT genotype and allele C were significantly present in the controls, and the CT genotype was distributed significantly in the patients. The TT genotype was mostly distributed in the mild-moder
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreThe primary objective of this research is to determine the best EDI
software application that meets the users' requirements, and to show
the functionality potentially presented in any software of electronic
data interchange (EDI) system. Also, in this paper, will be addressed
issues relating to integration EDI system into business process, and
the issues regarding the performance of EDI application will also be
discussed
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur
... Show More