Through the researchers' acquaintance with the previous studies, the problem was identified as that the preparation of training curricula in all its units must be based on accurate scientific foundations. Positively affect the type of attack and its implication in the presence of correlational relations, whether direct or indirect, i.e., precedence in training and in preparing units Therefore, the researcher decided to build a causal model to know the relationships to show the best model of the direct straight attack. The study aimed to build a causal model for the most important physical measurements and kinetic capabilities of the direct straight attack in the research sample. The two researchers used the descriptive approach in t
... Show MoreSome of the characters of the Staphylolysin A and D enzymes purified from Pseudomonas aeruginosa P16 and P5 respectively were studied, the molecular weights of Staphylolysin A and D were 20.417 kilo dalton and 23.988 kilo Dalton respectively by SDS- polyacryl amide gel electrophoresis. The optimum pH for staphylolysin A activity was found to be 8 which gives higher activity reaches 150 unit/ml, and for enzyme stability was 7.5-8.5 in which the enzyme nearly retained its full activity, while it was 9.5 for staphylolysin D that gives higher activity of 16 unit/ml,and 8.5-9.5 for enzyme stability in which the enzyme nearly retained its full activity, Maximum activity of two enzymes was obtained at 40C in which the specific activity for st
... Show MoreIn recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show MoreThose interested in the educational process and lesson management sought to invest the information experience with industrial intelligence and technology because of its importance in increasing the effectiveness of lesson management and developing the creative capabilities of the teacher in directing and managing his lesson. Field research for sports educational institutions that are interested in managing the lesson and preparing mathematical teaching cadres is an important issue and necessary means for identifying the most important phenomena that accompany the process of managing the educational process, as the teacher's success in providing the appropriate conditions to provide rich and influencing experiences in managing and directing
... Show MoreABSTRACT : This research involves the synthesis of five to seven heterocyclic compounds starting with Schiff’s bases which derived from oxime as a starting material. 1.3-oxazepine derivatives were prepared from adding different anhydrides to the Schiff bases, tetrazole and thiazolidinone derivatives synthesized from add sodium azide and thioglycolic acid to the same Schiff’s bases as a five members ring. Pyrimidine derivatives were prepared after the reaction of the azomethine group with acetyl chloride and then urea and thiourea to synthesis on derivatives contain the six members ring. Another step included identified and confirmed these compounds by FT- IR, 1HNMR, TLC and 13CNMR finally, step included the assay of biological activity
... Show MoreGiven the importance of the phenomenon of bullying and its spread in the productions of animated films and the resulting impact on them, and the dominance of a large number of satellite channels that simulate different age stages and for both sexes. It is bullying others and their imitation of characters inspired by animated films with aggressive behavior that appears in them by imposing his authority by force on those who are weaker than him and in various methods that fall within the concept of bullying, and the interest of most satellite channels in this type of production that simulates different age groups, this research comes as an attempt A scientific method through which the researcher seeks to know the issue of the dramatic cons
... Show More