There is no adopt in the importance of the optical communications in scientific civil and military applications because of it’s simplicity in manufacturing and it's low cost. The method of optical communication depends upon bearing the light beam the translated informations by a method called the light modulation. This method depends upon changing some light properties as frequency, amplitude and pulse duration according to the translating informations. The changes in the first two properties are concerned optically with the analog modulation while the third one concern at most with digital modulation. All past methods are expensive with low efficiency and needs electrical or magnetic fields. In this technique the source of voice used a source of emitting light at the same time. This was done by using a reflecting microphone to reflect the incident laser beam to the receiver which was an photocell which connected to an audio amplifier. The emitting voice was clear without any type of noise with very high efficiency.
The current research aims to determine the requirements of Trends of International Mathematics and Science Study (TIMSS 2019) and to find out the extent to which the content of science textbooks for grades (1-4) in the Sultanate of Oman includes the requirements of (TIMSS 2019). Only the Cognitive Process dimension has been considered when conducting the analysis. The study population includes all science books from the first to the fourth grade for the academic year 2021-2022. The study identified and organized the requirements in the study tool, which is a list of requirements of (TIMSS 2019). After confirming its validity and reliability, the analysis was performed, and data were collected and analyzed statistically using frequencies
... Show MoreAbstract The Object of the study aims to identify the effectiveness of using the 7E’s learning cycle to learn movement chains on uneven bars, for this purpose, we used the method SPSS. On a sample composed (20) students on collage of physical education at the university of Baghdad Chosen as two groups experimental and control group (10) student for each group, and for data collection, we used SPSS After collecting the results and having treated them statistically, we conclude the use 7E’s learning cycle has achieved remarkable positive progress, but it has diverged between to methods, On this basis, the study recommended the necessity of applying 7E’s learning cycle strategy in learning the movement chain on uneven bar
... Show MoreFlexible molecular docking is a computational method of structure-based drug design to evaluate binding interactions between receptor and ligand and identify the ligand conformation within the receptor pocket. Currently, various molecular docking programs are extensively applied; therefore, realizing accuracy and performance of the various docking programs could have a significant value. In this comparative study, the performance and accuracy of three widely used non-commercial docking software (AutoDock Vina, 1-Click Docking, and UCSF DOCK) was evaluated through investigations of the predicted binding affinity and binding conformation of the same set of small molecules (HIV-1 protease inhibitors) and a protein target HIV-1 protease enzy
... Show MoreBackground: Insufficient sleep due to excessive media use is linked to decrease physical activity, poor nutrition, obesity, and decreased overall health-related quality of life.
Objectives: To assess the effect of using the internet and social media on the sleep of 4th-stage secondary school students.
Subjects and Methods: Cross-sectional study with the analytic element; for 500 secondary school students, obtained by choosing two schools randomly from each of the six educational directorates, by using a structured questionnaire.
Result: Secondary scho
... Show MoreThe aim of this research is to construct a three-dimensional maritime transport model to transport nonhomogeneous goods (k) and different transport modes (v) from their sources (i) to their destinations (j), while limiting the optimum quantities v ijk x to be transported at the lowest possible cost v ijk c and time v ijk t using the heuristic algorithm, Transport problems have been widely studied in computer science and process research and are one of the main problems of transport problems that are usually used to reduce the cost or times of transport of goods with a number of sources and a number of destinations and by means of transport to meet the conditions of supply and demand. Transport models are a key tool in logistics an
... Show MoreSince the beginning of this century, a new communication map has been formed that foretells to get mankind to enter into a media environment in which the media is mixed with communication, which is technically and even intellectually known as integration.
This environment and its features are no different from the environment in its natural physical incision. If the level and temperature in the physical nature is a specific issue in the natural ecological balance, the level of freedoms, especially the transfer of information and views and circulation in society is also a determinant in the extent of media balance in the world on the one hand and in each country on the other.
There is also a special environment for nature,
... Show MorePurpose: As managers can lead a set of ways to improve internal communication in public organizations, and leadership can cultivate a common understanding of goals within the organization and share the vision in preparation for its way to better performance, the purpose of the research is to assess the type and strength of the relationship between internal communication and different forms of leadership. Theoretical framework: The study demonstrates how leaders in public organizations improve internal communication, related to employees' perceptions of public organizations' routines and performance. Design/methodology/approach: The study uses the ordinary least squares (OLS) and applied multiple regression A sa
... Show MoreSensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps
... Show MoreIt reveals speech communication whether it is legible audible or visible on a comprehensive formula inhabited open language on the modalities for reporting cases of the source say, making communication cognitive processes, is not to produce arguments as it is about the generation of the content of communication, so the contact of any kind remains practice for the cognitive action by the language in which it operates as a way agreed to their units between the poles of communication circle in the framework of a certain socio-cultural context, and that becomes the basis of the text of the message external referrals, making it feasible for multiple readings in semantic dimensions and deliberative