Preferred Language
Articles
/
jcoeduw-1124
Education Development in Local Community Analysis Study
...Show More Authors

Human resources are considered as strategic fortune for being the main driver of the development wheel in the society, and the field of education and learning is one of the main pillars of this fortune for its great effect in the process of economic and social progress of individuals. I was the subject of education to the concerns of many countries, as adopted national policies . And regional support and the reduction of constraints, so came our study (education hub for human development) to identify the role of education in human development and to identify the obstacles facing the education process and the extent of its impacts negatively on the process of human development also contribute to the knowledge of school enrollment and the extent of its impact on human development, and work to provide the necessary needs and requirements to raise the educational services. And gaining the study of great significance because education is one of the cornerstones of human development, it is also among the important pillars to build a knowledge-based society, it means actors to fight poverty, ignorance and extremism and the reduction of social crises and unrest political and security stability and security as it manifests the importance of this study addressed the phenomenon of development, which means the development of human society, because man is a tool and a very economic development in all its dimensions and political and social classes and trends intellectual, scientific and cultural. The search includes two sections have reached an outcome of the most important: 1 - The results of the study showed that education leads to raise the level of public services in the community. 2 - Results showed that the ratios of non-enrollment of children covered by the compulsory education in schools is very high for both sexes due to the bad security situation and the distance between the home and the school has had a negative effect in the failure of the sons to continue the education process 3 - found that double shifts school and after school buildings and geographical location another reason not to pursue the sons of Education 4 - The results of the study show that literacy helps to achieve material well-being of the community. Also came out ofthe most important recommendations :

Cooperation with the civil society institutions through central and sectoral symposiums for all the parties of the education process and the inhabitants, especially in the areas where schools suffer from high leakage rates, and the adoption of successful methods to address these cases. 2. There is a need to take care of schools buildings, and the availability of basic services in these buildings through the preparation of a map of spatial distribution of schools buildings within the city of Baghdad using the (GIS) system in agreement with the Ministry of Education, Directorates of Education, and Baghdad Mayoralty. The map must include locations of the educational institutions in all the districts of the city of Baghdad to be the base of all the decisions related to construction, maintenance and repair of these buildings, and prepare schedules for periodic visits to all schools in the area to determine their needs for maintenance and sustainability. 3. Increasing the attention to the late students, through the provision of programs for the orientation and educational guidance and opening schools in Iraq for adult education. 4. Improving the educational level in the country, by enriching the curriculums and teaching methods and raising the level of teachers, which hinder the education process. 5. The provision of health services in each school to improve the health of students and children.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Engineering
Generation and Experimental Stress Analysis of Elliptical Gears with Combined Teeth
...Show More Authors

In this study, generation of elliptical gears with different teeth profiles of crowned involute, double circular arc (DCA), and combined (crowned involute with DCA) has been developed. The resulting mathematical equations have been computerized and feed to CNC end mill machine to manufacture elliptical gear models with different profiles. These models are investigated in plane polariscope to show the resulting stresses under certain load. Comparison of photo-elastic stress results shows that combined elliptical gears with DCA side as a loaded side have a minimum resulting contact stress with a reduction percentage of 40% compare with contact stresses in counterpart elliptical gear of involute profile (which is commonly u

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Multiwavelet and Estimation by Interpolation Analysis Based Hybrid Color Image Compression
...Show More Authors

Nowadays, still images are used everywhere in the digital world. The shortages of storage capacity and transmission bandwidth make efficient compression solutions essential. A revolutionary mathematics tool, wavelet transform, has already shown its power in image processing. The major topic of this paper, is improve the compresses of still images by Multiwavelet based on estimation the high Multiwavelet coefficients in high frequencies sub band  by interpolation instead of sending all Multiwavelet coefficients. When comparing the proposed approach with other compression methods Good result obtained

View Publication Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Biochemical And Cellular Archives
QUANTITATIVE ANALYSIS OF SOME AROMATIC AMINO ACIDS BY SPECTROPHOTOMETRIC MATHEMATICAL DERIVATIZATION
...Show More Authors

A simple UV spectrophotometric differential derivatization method was performed for the simultaneous quantification of three aromatic amino acids of tryptophan, the polar tyrosine and phenylalanine TRP, TYR and PHE respectively. The avoidance of the time and reagents consuming steps of sample preparation or analyze separation from its bulk of interferences made the approach environmentally benign, sustainable and green. The linear calibration curves of differential second derivative were built at the optimum wavelength for each analyze (218.9, 236.1 and 222.5 nm) for PHE, TRP and TYR respectively. Quantification for each analyze was in the concentration range of (1.0– 45, 0.1–20.0 and 1.0– 50.0 μg/ml) at replicates of (n=3) with a re

... Show More
Preview PDF
Scopus (1)
Scopus
Publication Date
Mon Nov 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of women's job offer through entrepreneurship The case of Algeria
...Show More Authors

The aim of this scientific paper is to highlight the effective role of women working in economic development, especially those working in the entrepreneurial sector, which we see as encouraging at the macro-economic level and at the personal level, by highlighting their potential to help them enter the private labour market, value them and empower their role in the economic arena in order to win this bet to become productive and effective workers at all levels.

Through this paper, we will try to highlight the role of Algerian women's contribution to economic development through access to the world of entrepreneurship, and we will also try to find statistics on their success levels at the local and interna

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of The Mechanical Behavior Of Materials
Analysis of concrete beams reinforced by GFRP bars with varying parameters
...Show More Authors
Abstract<p>Structural buildings consist of concrete and steel, and these buildings have confronted many challenges from various aggressive environments against the materials manufactured from them. It contains high water levels and buildings whose concrete cover may be damaged and thus lead to the deterioration and corrosion of steel. It was important to have an alternative to steel, such as the glass fiber reinforced polymer (GFRP), which is distinguished by its great effectiveness in resisting corrosion, as well as its strong tensile resistance. Still, one of its drawbacks is that it has a low modulus of elasticity. This research article aims to conduct a numerical study using the nonlinear fi</p> ... Show More
Scopus (16)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Tue Sep 26 2023
Journal Name
Brazilian Journal Of Biometrics
Bifurcation analysis of commensalism intraction and harvisting on food chain model
...Show More Authors

In this paper, we study the incorporation of the commensalism interaction and harvesting on the Lotka–Volterra food chain model. The system provides one commensal prey, one harvested prey, and two predators. A set of preliminary results in local bifurcation analysis around each equilibrium point for the proposed model is discussed, such as saddle-node, transcritical and pitchfork. Some numerical analysis to confirm the accruing of local bifurcation is illustrated. To back up the conclusions of the mathematical study, a numerical simulation of the model is carried out with the help of the MATLAB program. It can be concluded that the system's coexistence can be achieved as long as the harvesting rate on the second prey population is

... Show More
View Publication
Scopus (17)
Crossref (10)
Scopus Crossref
Publication Date
Sat May 16 2009
Journal Name
Journal Of Planner And Development
Quantitative analysis of the economic characteristics of the land transport network
...Show More Authors

Highway network could be considered as a function of the developmental level of the region, that it is representing the sensitive nerve of the economic activity and the corner stone for the implementation of development plans and developing the spatial structure. The main theme of this thesis is to show the characteristics of the regional highway network of Anbar and to determine the most important effective spatial characteristics and the dimension of that effect negatively or positively. Further this thesis tries to draw an imagination for the connection between highway network as a spatial phenomenon and the surrounded natural and human variables within the spatial structure of the region. This thesis aiming also to determine the natu

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Dar Amjad For Publishing And Distribution, The Hashemite Kingdom Of Jordan
Statistical Analysis of Non-parametric Tests Using IBM SPSS Statistics Version24
...Show More Authors

أن الطرق اللامعلمية هي نوع من الطرق الاحصائية الاستدلالية التي يمكن استخدامها للتوصل إلى أستنتاجات لذا كان حرص المؤلف على أصدار هذا الكتاب والذي يعمل على توضيح ( لماذا ؟ ومتى ؟ وكيف ؟ ) تستخدم كل طريقة إحصائية . وبإمكان القاريء سواء أكان أستاذا ً جامعيا ً أو باحثا ً أو طالبا ً في الدراسات العليا ( الماجستير والدكتوراه ) أو طالبا ً في الدراسات الأولية أن يتتبع جميع الخطوات لحساب كل قانون إحصائي وبدءا ً من عملية إدخ

... Show More
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More