Preferred Language
Articles
/
jcofarts-156
Form and function in the design of intellectual toys
...Show More Authors

Playing is the only common language among children in every place and time, to the fact that what distinguishes the children is their quest to play and fun way innate, not acquired, which is expressed with the child really is one of the rights. And play a key entrance to the growth of the child mentally, intellectually and cognitively and not for the child emotionally and socially just. In the play the child begins to identify and classify objects and learn concepts and circulate among themselves on a linguistic basis. Activity here and play a major role in leading the linguistic development of the child in the composition has the communication skills.

The Games (especially intellectual ones) Whatever the cause of the development of children's skills and education, which is a fertile source of learning resources and a factor of mental development of the child factors, and this fact has shown a range of studies carried out by a number of researchers in the field of children's toys, including (Jean Piaget and Frederick Frobel and Torrance), who stressed the critical importance of play in solving problems and getting the knowledge that  knowledge abstract that may come to the children through the narrative, education, Playing gives the kids a chance to come to grips inform them and to discover and develop themselves and discover others and develop personal relationships with those around them and gives them a chance tradition the others.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Exponential Function of a bounded Linear Operator on a Hilbert Space.
...Show More Authors

In this paper, we introduce an exponential of an operator defined on a Hilbert space H, and we study its properties and find some of properties of T inherited to exponential operator, so we study the spectrum of exponential operator e^T according to the operator T.

View Publication Preview PDF
Crossref
Publication Date
Sat Feb 26 2022
Journal Name
Iraqi Journal Of Science
Bifurcation Diagram of W(u_j;τ)-Function with (p,q)-Parameters
...Show More Authors

      This study aims to classify the critical points of functions with 4 variables and 8 parameters, we found the caustic for the certain function with the spreading of the critical points. Finally, as an application, we found the bifurcation solutions for the equation of sixth order with boundary conditions using the Lyapunov-Schmidt method in the variational case.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Nov 21 2019
Journal Name
Journal Of Engineering
Thermal Buckling of Angle-Ply Laminated Plates Using New Displacement Function
...Show More Authors

ABSTRACT

Critical buckling temperature of angle-ply laminated plate is developed using a higher-order displacement field. This displacement field used by Mantari et al based on a constant ‘‘m’’, which is determined to give results closest to the three dimensions elasticity (3-D) theory. Equations of motion based on higher-order theory angle ply plates are derived through Hamilton, s principle, and solved using Navier-type solution to obtain critical buckling temperature for simply supported laminated plates. Changing (α2/ α1) ratios, number of layers, aspect ratios, E1/E2 ratios for thick and thin plates and their effect on thermal

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Using Quadratic Form Ratio Multiple Test to Estimate Linear Regression Model Parameters in Big Data with Application: Child Labor in Iraq
...Show More Authors

              The current paper proposes a new estimator for the linear regression model parameters under Big Data circumstances.  From the diversity of Big Data variables comes many challenges that  can be interesting to the  researchers who try their best to find new and novel methods to estimate the parameters of linear regression model. Data has been collected by Central Statistical Organization IRAQ, and the child labor in Iraq has been chosen as data. Child labor is the most vital phenomena that both society and education are suffering from and it affects the future of our next generation. Two methods have been selected to estimate the parameter

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Estimating the reliability function of the asymmetrical hybrid parallel-series system: Applied study at the state company for vegetable oils industry
...Show More Authors

The research studied and analyzed the hybrid parallel-series systems of asymmetrical components by applying different experiments of simulations used to estimate the reliability function of those systems through the use of the maximum likelihood method as well as the Bayes standard method via both symmetrical and asymmetrical loss functions following Rayleigh distribution and Informative Prior distribution. The simulation experiments included different sizes of samples and default parameters which were then compared with one another depending on Square Error averages. Following that was the application of Bayes standard method by the Entropy Loss function that proved successful throughout the experimental side in finding the reliability fun

... Show More
Scopus
Publication Date
Sun Nov 12 2023
Journal Name
Migration Letters
Piezoelectric Energy Harvesting from Vortex-Induced Vibrations: Design and Correlations
...Show More Authors

This study delves into the design optimization of a hydropower harvesting system, exploring various parameters and their influence on system performance. By modifying the variables within the model to suit different flow conditions, a judiciously optimized design is attainable. Notably, the lift force generated is found to be intricately linked to the strategic interplay of the bluff body's location, cylinder dimensions, and flow velocity. The findings culminate in the establishment of empirical equations, one for lift force and another for displacement, based on the force equation. Many energy harvesting approaches hinge on the reciprocating motion inherent to the structural system. The methodology developed in this study emerges as a pot

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
السلوك القیادي لدى الاطفال الایتام واقرانھم غیر الایتام في المرحلة الابتدائیة
...Show More Authors

The family is considered one of the most important social institutions which has a
strong and clear effect on the child in forming his personality through the process
of social upbringing which works on transforming the child from a merely
biological being into an individual who has customs and traditions and the behavior
of the group to which he belongs, and till now there is no social organization or
institution that can do this process not even in partial way like the family
.Therefore depriving the child of his parents leads to depriving him of the normal
chances of growth which relate to his age stage and thus this shortcoming is hard to
treat and based on the preceding the current research aimed at the follo

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 15 2021
Journal Name
2021 International Conference On Computing And Communications Applications And Technologies (i3cat)
Parallel Hybrid String Matching Algorithm Using CUDA API Function
...Show More Authors

View Publication
Crossref