This study aimed at identifying the counseling needs for classroom teachers specialization in
Jerash university. The sample of the study consisted (112) students. To achieve this goal a
scale with (39) items was built by the researcher, this scale has four domains they are as
follows; family, social, psychological and academic domain. The results of this study showed
that counseling needs obtain the heighest average. As well as, the results of the study revealed
that there were statistical differences in favor of gender and teaching year variable. Finally the
study stated a list of recommendations.
The present study focused mainly on the buckling behavior of composite laminated plates subjected to mechanical loads. Mechanical loads are analyzed by experimental analysis, analytical analysis (for laminates without cutouts) and numerical analysis by finite element method (for laminates with and without cutouts) for different type of loads which could be uniform or non-uniform, uniaxial or biaxial. In addition to many design parameters of the laminates such as aspect ratio, thickness ratio, and lamination angle or the parameters of the cutout such as shape, size, position, direction, and radii rounding) which are changed to studytheir effects on the buckling characteristics with various boundary conditions. Levy method of classical lam
... Show MoreOne hundred forty three of Klebsiellapneumoniae isolates had been collected from some hospitals in Baghdad city. The isolates were taken from different clinical specimens.Antimicrobial susceptibility test was carried out towards fifteen antimicrobial agents by using Vitek2 system with Antimicrobial susceptibility test cards. The results of antibiogram showed that the local isolates were possess highly resistance towards most antimicrobial agents under study. The high resistance wastoAmpicillin while the low resistance was to Imipenem.Two methods were used for detection of Extended Spectrum Beta Lactamases (ESBLs) production; first methods by using of Vitek2 system,thesecondmethods by using of polymerase chain reaction (PCR) technique to dis
... Show MoreAs one type of heating furnaces, the electric heating furnace (EHF) typically suffers from time delay, non-linearity, time-varying parameters, system uncertainties, and harsh en-vironment of the furnace, which significantly deteriorate the temperature control process of the EHF system. In order to achieve accurate and robust temperature tracking performance, an integration of robust state feedback control (RSFC) and a novel sliding mode-based disturbance observer (SMDO) is proposed in this paper, where modeling errors and external disturbances are lumped as a lumped disturbance. To describe the characteristics of the EHF, by using convection laws, an integrated dynamic model is established and identified as an uncertain nonlinear second ord
... Show MoreIn this paper a new structure for the AVR of the power system exciter is proposed and designed using digital-based LQR. With two weighting matrices R and Q, this method produces an optimal regulator that is used to generate the feedback control law. These matrices are called state and control weighting matrices and are used to balance between the relative importance of the input and the states in the cost function that is being optimized. A sample power system composed of single machine connected to an infinite- bus bar (SMIB) with both a conventional and a proposed Digital AVR (DAVR) is simulated. Evaluation results show that the DAVR damps well the oscillations of the terminal voltage and presents a faster respo
... Show MoreMany conservative sphincter-preserving procedures had been described to be effective in
healing of anal fistula without excision or de roofing.
Objective: To verify the outcome of mere photocoagulation of the fistula tract on healing of low anal
fistula.
Materials and Methods: Using 810nm diode laser, the tracts of low anal fistulae in a cohorts of six male
patients (mean age of 32 yr) had been photocoagulated by retrograde application of laser light through an
orb tip optical fiber threaded in to the tract. Swabs for culture and sensitivity testing were obtained before
and after laser application. Patients were followed up regularly to announce fistula healing.
Results: Mean laser exposure time was 6.6 min., mean
This research dealt with highlighting the images of marriage through the modern means of communication and the legal ruling for it. Dowry even be knotted on them; because they are then one of the parties to the contract and contracted in one contract, and this is prohibited by law and law and common sense.
It turns out that it is permissible to advertise marriage through the Internet in accordance with the rules and standards that preserve values and morals and safeguard dignity and chastity. The acts in Islamic law are vested with intentions. If intentions are true, then the act is true, and Internet marriage is what falls under this order.<
... Show MoreDue to increasing cost of asphalt binder, significant economic savings can be realized by using the amount from reclaimed asphalt pavement (RAP) in the production of new hot mix asphalt (HMA). Moreover, this is an environmentally friendly option as it reduces the demand for virgin materials. It has to be remarked that in Iraq RAP is not used in the production of HMA and this valuable material is mostly degraded for use in lower value applications. Four mixtures were designed, which contains three different percent RAP, it is (0%, 5%, 15%) with asphalt grade (40-50) and (25%) with asphalt grade (60-70), it has been changed the grade of asphalt when adding RAP (25%) to compensate for the aged binder in the RAP when adding to mixture. All type
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More