This research includes problems that facing the philosophy of education in the variables of knowledge and Informatics society (techno _ social).
The problematic research included three questions:
1- What are the concepts and characterization related to the problematic of relationship between the philosophy of education and informatics variables (techno - social).
2-What kind of problems facing speech philosophy of education in the variables information (techno - social)
3 - What are the perceptions of educational proposed to address problematic philosophy of education in the scope of human (human nature) and (values and morals), in addition the research may explain the co
... Show MoreWe extended the characterization of strict local minimizers of order two in ward,s
theorem for nonlinear problem to a certain class of nonsmooth semi-infinite problems with inequality constraints in the nonparametric constraint case.
Concentration of NORM then radiological hazard indices were investigated and assessed in different stages of oil and gas production industry that belongs to East Baghdad Oil Field. Sixteen samples of different types of materials were collected representing oil and gas production from first stage to final stage. The samples are prepared then sent to Radiation Protection Center (RPC) / Ministry of Environment for radioactivity analysis using gamma ray spectrometry system based on HPGe. The results show that max value of Ra-226 is 252.4 Bq/kg in sediment sample collected from the final stage of water treatment before it is transferred to disposal well and min value is 1.2 Bq/kg in formation water. The max. activity of Th-232 is 79.4Bq/kg al
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Beyond the immediate content of speech, the voice can provide rich information about a speaker's demographics, including age and gender. Estimating a speaker's age and gender offers a wide range of applications, spanning from voice forensic analysis to personalized advertising, healthcare monitoring, and human-computer interaction. However, pinpointing precise age remains intricate due to age ambiguity. Specifically, utterances from individuals at adjacent ages are frequently indistinguishable. Addressing this, we propose a novel, end-to-end approach that deploys Mozilla's Common Voice dataset to transform raw audio into high-quality feature representations using Wav2Vec2.0 embeddings. These are then channeled into our self-attentio
... Show MoreThe use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow
... Show MoreThis study was done to evaluate a new technique to determine the presence of methamphetamine in the hair using nano bentonite-based adsorbent as the filler of extraction column. The state of the art of this study was based on the presence of silica in the nano bentonite that was assumed can interact with methamphetamine. The hair used was treated using methanol to extract the presence of methamphetamine, then it was continued by sonicating the hair sample. Qualitative analysis using Marquish reagent was performed to confirm the presence of methamphetamine in the isolate.The hair sample that has been taken in a different period confirmed that this current developing method can be used to analyzed methamphetamine. This m
... Show MorePsoriasis is a common, chronic, immune-mediated skin disease with systemic pro-inflammatory activation. This study was designed to estimate the level of two cytokines, Interleukin-36 (IL-36) and Interleukin-10 (IL-10), in psoriasis female patients. The study was accomplished on 50 Iraqi patients with psoriasis who were referred to the consulting clinic at Al-Yarmouk Teaching Hospital during the period from November 2018 to March 2019. These patients were diagnosed under the supervision of dermatologists. For the purpose of comparison, the study included 30 healthy women as a healthy control group. The serum levels of cytokines were measured using the enzyme-linked immunosorbent technique (ELISA).The results of this study show
... Show MoreTo determine the relationship between Helicobacter pylori infection and Multiple Sclerosis (MS) disorder, 20 patients with MS aged (25-60) years have been investigated from the period of 2016/12/1 to 2017/3/1 and compared to 15 apparently healthy individuals. All study groups were carried out to measure anti H.pylori IgA and H.pylori IgG antibodies by enzyme linked immunosorbent assay (ELISA) technique. There was a significant elevation (p<0.05) in the concentration of anti H.pylori IgG and IgA antibodies (Abs) compared to control group, and there was no significant difference (p>0.05) in the concentration of IgA and IgG (Abs) of H.pylori according to gender, and there was no significant difference (p>0.05) in the concentration of IgA and I
... Show More