The current research aims to assess the Brief Book of the Modern and Contemporary History of Asia from the perspective of the students in the Department of History, University of Baghdad. The study is carried out in Iraq and the research group has included students of the Department of History in the College of Education--Ibn Rushd and the College of Education for Women- University of Baghdad. The chosen sample of the assigned research consisted of (72) students from third stage in the Department of History, which equals (0.38%) of the total group members amounted (188) female and male students representing (40) students from the College of Education--Ibn Rushd, and 32 students from the College of Education for Women. The researcher has addressed an open question to a sample of 20 reviewers of students in this department representing (0.11) of the total group originally gathered to make their remarks on the Brief Book of the Modern and Contemporary History of Asia, which is intended to be taught in 2014 within the curriculum prepared by the Ministry of Higher Education and Scientific Research. In the light of the responses and reviews of the assigned research group , the method of this research involved the (questionnaire) consisting of 40 assessing items which are classified to six fields such as: Introduction of the book, General aims, Teaching contents, Teaching activities, Technical direction, Preparing and composing the Brief Book of the Modern and Contemporary History of Asia.
Prediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pr
... Show More<span lang="EN-US">The need for robotics systems has become an urgent necessity in various fields, especially in video surveillance and live broadcasting systems. The main goal of this work is to design and implement a rover robotic monitoring system based on raspberry pi 4 model B to control this overall system and display a live video by using a webcam (USB camera) as well as using you only look once algorithm-version five (YOLOv5) to detect, recognize and display objects in real-time. This deep learning algorithm is highly accurate and fast and is implemented by Python, OpenCV, PyTorch codes and the Context Object Detection Task (COCO) 2020 dataset. This robot can move in all directions and in different places especially in
... Show MoreB aa cc kk gg r oo uu nn dd : Very low birth weight (VLBW) neonates constitute approximately 4–7 percent of all live births and their mortality is very high. O bb j ee cc t i vv ee: to find out if there is a relationship between Very Low Birth Weight Neonates and increased neonatal mortality for age 0 to 7 days. M ee t hh oo dd ss A retrospective study of VLBW neonates admitted to NICU at Ibn Al- Baladi Pediatrics and Maternity hospital over one year (2012)were studied, study period was from April till August 2013. Exclusion criteria were: (1) neonates weighing less than 700 g and with gestational age less than 24 weeks (abortion) (2) death in the delivery room (3) neonates weighing more than 1500 g. (4) Postnatal age more than 7 days.
... Show MoreWe study in this paper the composition operator that is induced by ?(z) = sz + t. We give a characterization of the adjoint of composiotion operators generated by self-maps of the unit ball of form ?(z) = sz + t for which |s|?1, |t|<1 and |s|+|t|?1. In fact we prove that the adjoint is a product of toeplitz operators and composition operator. Also, we have studied the compactness of C? and give some other partial results.
In this research, the influence of the orientation and distance factors on the lowest usable frequency (LUF) parameter has been studied theoretically. The calculations of the (LUF) parameter have been made using the (VOACAP) international communication model for the connection links between the capital Baghdad and many other locations that distributed on different distances and directions over the Middle East region. The results shown in this study indicate there is a slight affection of the link direction (orientation) on the LUF parameter, while the influence of the distance factor is more significant on the values of the LUF parameter. The day/night effect appears for the long distance HF links (i.e. more than a 500 Km)
Bootstrap is one of an important re-sampling technique which has given the attention of researches recently. The presence of outliers in the original data set may cause serious problem to the classical bootstrap when the percentage of outliers are higher than the original one. Many methods are proposed to overcome this problem such Dynamic Robust Bootstrap for LTS (DRBLTS) and Weighted Bootstrap with Probability (WBP). This paper try to show the accuracy of parameters estimation by comparison the results of both methods. The bias , MSE and RMSE are considered. The criterion of the accuracy is based on the RMSE value since the method that provide us RMSE value smaller than other is con
... Show MoreIn this paper, double Sumudu and double Elzaki transforms methods are used to compute the numerical solutions for some types of fractional order partial differential equations with constant coefficients and explaining the efficiently of the method by illustrating some numerical examples that are computed by using Mathcad 15.and graphic in Matlab R2015a.
Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show More 
        