This research aims to identify the effect of numbered heads strategy on developing oral expression skills among fifth-grade primary students in Bisha Province. To achieve this, the researcher prepared a research tool represented in the observation card which consists of (27) statements distributed in four axes. The tool was sent to (5) experts in the field to verify their validity. In light of their corrections, the tool was developed to be valid for gathering field information. To verify the validity of the content and the reliability of the tool, the researcher applied it to a sample consists of (20) students from outside the research group. The overall coefficient of correlation between the statements of the tool is as follows: (.95,
... Show MoreIn this paper, a new class of non-convex functions called semi strongly (
The current research aims to identify the stressful life events among middle school students in terms of gender (male-female), academic branch (scientific-literary), and the Life Skills of the students of the preparatory stage in terms of gender (male-female), and academic branch (scientific-literary). Additionally, the study aims to identify the relationship between stressful life events and life skills in middle school students. A sample of (200) students who were selected randomly from the Directorate of education of Baghdad Karkh/ III was used in this study. To achieve the objectives of the current research, the researcher has adopted two scales, the stressful life events scale for the researcher Al-Sultan (2008), and the life skills
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show Moreتعد الملابس وسيلة هامة لكل مايقوم به الانسان في حياته العامة ، فهي الانطباع والكلمة الخارجية عن ذاته الداخلية فهي تعكس فكرة الفرد عن ذاته وعن شخصيته , كما تعد وسيلة تعبير جمالية وفنية , فهي تساعد على اخفاء عيوب الجسد وابراز محاسنه . ويتوقف اختيار الفرد لملابسه على مجموعة عوامل منها احتياجه , قدراته المالية , سنه , مركزه الاجتماعي , طبيعة عمله ,الظروف الجوية التي يعيش فيها وعلى مايُؤمن به من قيم و
... Show MoreThe aim of this study is to develop a novel framework for managing risks in smart supply chains by enhancing business continuity and resilience against potential disruptions. This research addresses the growing uncertainty in supply chain environments, driven by both natural phenomena-such as pandemics and earthquakes—and human-induced events, including wars, political upheavals, and societal transformations. Recognizing that traditional risk management approaches are insufficient in such dynamic contexts, the study proposes an adaptive framework that integrates proactive and remedial measures for effective risk mitigation. A fuzzy risk matrix is employed to assess and analyze uncertainties, facilitating the identification of disr
... Show MoreThe investigation of machine learning techniques for addressing missing well-log data has garnered considerable interest recently, especially as the oil and gas sector pursues novel approaches to improve data interpretation and reservoir characterization. Conversely, for wells that have been in operation for several years, conventional measurement techniques frequently encounter challenges related to availability, including the lack of well-log data, cost considerations, and precision issues. This study's objective is to enhance reservoir characterization by automating well-log creation using machine-learning techniques. Among the methods are multi-resolution graph-based clustering and the similarity threshold method. By using cutti
... Show More