The study of sex Structure and age characteristics of an important element of the
follow-up changes between different population groups, which are connected to a large degree
the demographic, social and economic characteristics, particularly since each population
group varying characteristics in terms of age, sex entail social, demographic, cultural and
economic implications, and from that the researcher has taken from Structure of sex and age
for population in the district of Tuz Khurmatu for (1997-2012 ) the subject of consideration
and maintain compared to see the contrast between them. Qualitative Research for installation
and the age of the urban and rural areas has touched the judiciary, as well as its respects
Theresearch took the spatial autoregressive model: SAR and spatial error model: SEM in an attempt to provide a practical evident that proves the importance of spatial analysis, with a particular focus on the importance of using regression models spatial andthat includes all of them spatial dependence, which we can test its presence or not by using Moran test. While ignoring this dependency may lead to the loss of important information about the phenomenon under research is reflected in the end on the strength of the statistical estimation power, as these models are the link between the usual regression models with time-series models. Spatial analysis had
... Show MoreThe research took the spatial autoregressive model: SAR and spatial error model: SEM in an attempt to provide practical evidence that proves the importance of spatial analysis, with a particular focus on the importance of using regression models spatial and that includes all of the spatial dependence, which we can test its presence or not by using Moran test. While ignoring this dependency may lead to the loss of important information about the phenomenon under research is reflected in the end on the strength of the statistical estimation power, as these models are the link between the usual regression models with time-series models. The spatial analysis had been applied to Iraq Household Socio-Economic Survey: IHS
... Show MoreThree-dimensional (3D) reconstruction from images is a most beneficial method of object regeneration by using a photo-realistic way that can be used in many fields. For industrial fields, it can be used to visualize the cracks within alloys or walls. In medical fields, it has been used as 3D scanner to reconstruct some human organs such as internal nose for plastic surgery or to reconstruct ear canal for fabricating a hearing aid device, and others. These applications need high accuracy details and measurement that represent the main issue which should be taken in consideration, also the other issues are cost, movability, and ease of use which should be taken into consideration. This work has presented an approach for design and construc
... Show MoreThis study aimed at investigating the effect of using computer in
Efficiency of Training Programme of Science Teachers in Ajloun District in
Jordan.
1- What is the effect of using computer in program for the two groups
2- ( the experimental and control group ) .
3- Are there any statistics different in the effect of using computer
program for the two groups ?
4- Are there any statistics (comparison ) or different of the effect of the
effect of using computer program refer to the sex (male or female )?
The community of the study consisted of all the science student in
educational directorate of Ajloun district for the academic year 2009 –
2010, they are (120) ( male and female) . The sample of the study<
This research addresses the necessity due to the scarcity of historical studies in the field of sports, especially those indicating the activities and achievements of Arab countries in the Paralympic movement. This study aims to document the participation of Arab countries in the Paralympic Games, explore the prominent sports in which Arab athletes with disabilities participated, and analyze their achievements during the Paralympic Games from 2004 to 2012. The research methodology adopted an analytical, historical approach, collecting and analyzing data objectively through the official website of the International Paralympic Committee, in addition to scientific and historical sources from research papers, journals, and websites. The key fi
... Show MoreBACKGROUND: HLA-B27 can effect clinical presentation and course of ankylosing spondylitis. Different detection techniques of HLA-B27 are available with variable sensitivities and specificities. OBJECTIVE: To compare serologic and molecular diagnostic techniques of detecting HLA-B27 status and to correlate it with some clinical variables among ankylosing spondylitis patients. PATIENTS AND METHODS: A cross-sectional study was conducted on 83 Iraqi patients with ankylosing spondylitis. Clinical and laboratory evaluations were reported. HLA-B27 status was determined in all patients by real-time PCR using HLA-B27 RealFast™ kit; ELISA method was used as well to detect soluble serum HLA-B27 antigens using Human Leukocyte Antigen® kit. RESULTS:
... Show MoreDuring COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More