In the spreading of the Internet, mobile smart devices, and interactive websites such as YouTube, the educational video becomes more widespread and deliberative among users. The reasons for its spread are the prevalence of technologies, cheap cost, and easy to use. However, these products often lack to the distinction in video production. By following videos of an educational channel on YouTube, some comments found to discuss the lack of the content presented to motivate the learners, which lead to reduce the viewers of the videos. Therefore, there is an important decision to find general standards for the design and production of educational videos. A list of standards has been drawn up to help those interested in producing educational
... Show MoreThe research abstract included introduction and the importance of the research, also included display of the problem represented by weakness for the players when performing some of the basic skills in badminton and the shuttle not reaching to the back corners of the court which gives the player the opportunity to win through applying the pressure on the opponent and make him away from the control center(T) which definitely required level of a collection muscular strength contributed in performance perhaps this related to a number of reasons related with weakness in physical changes especially explosive and characterized by speed forces for the badminton players and be acquainted with them and knowing the extent of their effect in performanc
... Show MoreIn this study, the researcher aims to analyze the content of the physics textbook for the 3rd intermediate grade according to the criteria for designing and producing infographics, and the research community consists of the content of the physics textbook for the 3rd intermediate grade intermediate grade for the academic year 2021-2022. The researcher adopted the analysis instruments with a number of the criteria for designing and producing infographics. The results revealed randomness in the percentage of the criteria included in the content of the physics textbook for the 3rd intermediate grade, and they are not compatible with the proposed criteria by the experts also.
Documentary Credit passes through many practical phases starting from Opening credit and matching documents and payment of the amount of credit……etc. It is worthy to mention that there are several aspects that are varied and differed from Bank to another one which can offer Competitive Advantage for the bank …This will be shown in this research.
For the purpose of achieving the objective of this research within the theoretical aspect, the researcher had seen and briefed several books and researches which are mainly related to the subject of the research.
As for the practical aspect, has included Questionnaire which included many questions that are fit and suitable to the hypotheses.
Research sample has
... Show MoreThe research aims to identify ways of upgrading the quality level of university education at the Middle Technical University in light of its application for the National Ranking project for the quality of Iraqi universities in order to obtain advanced grades among the Iraqi universities , Which is qualified to enter the Ranking of universities worldwide, through displaying the mechanism of the Application of National Ranking project for the quality of Iraqi universities in the Middle Technical University and its formations consisting of (5) technical colleges and (11) technical institute.
The results of the application showed several observations: The most
... Show MoreThe concept of TQM is based on one of the concepts that combine administrative and innovative methods. The aim of the research is to demonstrate the dimensions of TQM in enhancing the satisfaction of the taxpayers through a survey of a sample of officials in the General Authority for Taxation and 50 officials. In the collection of data and information, and the results were analyzed using the SPSS program to find the most important compounds and factors in he method of analysis.
The research problem was represented by the non-application of the General Authority for Taxation to the entrances and modern practices in the administrative work. The results of some of the complications that accompany the tax accounting process, which af
... Show MoreThe object of this research is to determine the effect in the differences of the correlation pattern of the micro blogging on the educational attainment of computer science curriculum for 12th grade students. I will try to test the best suited correlation and I might use the demo curriculum as well to achieve its objectives , The research method that will be used in this research is the quantitative method where we will use a sample of 60 students divided into two groups ( correlate the micro blogging - adopted the sequence pattern of relating the micro blogging) As a result, we found out that there are quantitative differences among the two groups' median , The differences goes back to the main effect of the correlation pattern of the m
... Show MoreBipedal robotic mechanisms are unstable due to the unilateral contact passive joint between the sole and the ground. Hierarchical control layers are crucial for creating walking patterns, stabilizing locomotion, and ensuring correct angular trajectories for bipedal joints due to the system’s various degrees of freedom. This work provides a hierarchical control scheme for a bipedal robot that focuses on balance (stabilization) and low-level tracking control while considering flexible joints. The stabilization control method uses the Newton–Euler formulation to establish a mathematical relationship between the zero-moment point (ZMP) and the center of mass (COM), resulting in highly nonlinear and coupled dynamic equations. Adaptiv
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More