Computer literacy is an urgent necessity for university students, given the rapid development in the means of communication in which we live in this era, and the flow of abundant information. Mainly on the computer in all administrative and academic transactions, where first of all the registration for the semester is done through the computer. Computer culture has many characteristics and advantages that distinguish it from other sciences, includ-ing the concept of computer culture that cannot be defined absolutely, and it is difficult to define its levels, because the specifications of the computer-educated individual differ from one individual to another, and from time to time also, you find it a luxury in a country What, and you find it necessary in another country. In order to measure and know the level of computer cul-ture among university students, a computerized scale of (40) items with five multiple-choice alternatives was built. In order to know that they have the skills of searching for information electronically, a computerized scale of (21) items was prepared, and a five-point Likert scale was adopted. Results showed that they have computer literacy and therefore they have skills of searching for information electronically at all.
The reason for applying the project is for the development of some physiological variables and skill performance using a device for the first time applied in Iraq to a sample of badminton players, and this device has a patent on 7/2/2019. An experimental method is used for a sample of (12) players from (Al-Orthodoxy club). The experimental group is applied the proposal technique, while, the control group is instructed by the coach.The results of the research attribute to the role of the proposal exercises of fit light technology, thus, this technology has increased the attention and focusing of the sample and some physiological variables and smash shot skill. It has been concluded that the exercises using fit light technology is helped to i
... Show MoreIs in this research review of the way minimum absolute deviations values based on linear programming method to estimate the parameters of simple linear regression model and give an overview of this model. We were modeling method deviations of the absolute values proposed using a scale of dispersion and composition of a simple linear regression model based on the proposed measure. Object of the work is to find the capabilities of not affected by abnormal values by using numerical method and at the lowest possible recurrence.
The Jeribe reservoir in the Jambour Oil Field is a complex and heterogeneous carbonate reservoir characterized by a wide range of permeability variations. Due to limited availability of core plugs in most wells, it becomes crucial to establish correlations between cored wells and apply them to uncored wells for predicting permeability. In recent years, the Flow Zone Indicator (FZI) approach has gained significant applicability for predicting hydraulic flow units (HFUs) and identifying rock types within the reservoir units.
This paper aims to develop a permeability model based on the principles of the Flow Zone Indicator. Analysis of core permeability versus core porosity plot and Reservoir Quality Index (RQI) - Normalized por
... Show MoreAdolescence important and sensitive stage in social terms, being a stage where learns teenager bear social responsibilities and composition of their ideas about family life, as well as it is the stage where the teenager looking to himself for an important place in the community to become independent socially people, so it highlights the role of Social Work to do better effort and I believe him in order to prepare for the adolescent stage of adolescence and help him overcome the problems so that makes it adapts to the society in which he lives
In general, the importance of cluster analysis is that one can evaluate elements by clustering multiple homogeneous data; the main objective of this analysis is to collect the elements of a single, homogeneous group into different divisions, depending on many variables. This method of analysis is used to reduce data, generate hypotheses and test them, as well as predict and match models. The research aims to evaluate the fuzzy cluster analysis, which is a special case of cluster analysis, as well as to compare the two methods—classical and fuzzy cluster analysis. The research topic has been allocated to the government and private hospitals. The sampling for this research was comprised of 288 patients being treated in 10 hospitals. As t
... Show MoreBackground: Plasma-activated water (PAW) is considered one of the emerging strategies that has been highlighted recently in the food industry for microbial decontamination and mycotoxin detoxification, due to its unique provisional characteristics. Aim: The effectiveness of PAW for aflatoxin B1 (AFB1), ochratoxin A (OTA), and fumonisin B1 (FB1) detoxification in naturally contaminated poultry feeds with its impacts on the feed quality were inspected. Methods: PAW-30 and PAW-60 were utilized for feed treatment for six time durations (5, 10, 15, 20, 40 and 60 min) each. The alterations in the physicochemical properties of PAW after different time durations of plasma inducement and treatment with and without feed samples were monit
... Show MoreDetecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulated und
... Show MoreFuture generations of wireless networks are expected to heavily rely on unmanned aerial vehicles (UAVs). UAV networks have extraordinary features like high mobility, frequent topology change, tolerance to link failure, and extending the coverage area by adding external UAVs. UAV network provides several advantages for civilian, commercial, search and rescue applications. A realistic mobility model must be used to assess the dependability and effectiveness of UAV protocols and algorithms. In this research paper, the performance of the Gauss Markov (GM) and Random Waypoint (RWP) mobility models in multi-UAV networks for a search and rescue scenario is analyzed and evaluated. Additionally, the two mobility models GM and RWP are descr
... Show MoreDetecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulate
... Show MoreThis paper presents a hybrid genetic algorithm (hGA) for optimizing the maximum likelihood function ln(L(phi(1),theta(1)))of the mixed model ARMA(1,1). The presented hybrid genetic algorithm (hGA) couples two processes: the canonical genetic algorithm (cGA) composed of three main steps: selection, local recombination and mutation, with the local search algorithm represent by steepest descent algorithm (sDA) which is defined by three basic parameters: frequency, probability, and number of local search iterations. The experimental design is based on simulating the cGA, hGA, and sDA algorithms with different values of model parameters, and sample size(n). The study contains comparison among these algorithms depending on MSE value. One can conc
... Show More