publishing has become a large space in the field of interactive education and modern pages have become dedicated to the service of the educational effort in this area as the research in this context of the urgent scientific necessities, especially as we consider in Iraq from the new countries in the exploitation of these new technologies and investment possibilities of the information network And the contents of different in the framework of so-called distance education Here lies the problem of research in the possibility of finding scientific solutions for the design of interactive inter active website for students of the preparatory stage in Iraq and to find out the scientific ways to find design The study, which included the problem of research and its importance and objectives and objective, spatial and temporal limits, which were limited in the study of the main pages of educational sites in Iraq and published in 2019, and then came the second chapter Which included the theoretical framework of the study and was on two subjects dealt with to know how to design interactive websites and what their contents and then the most important scientific indicators and then came the third chapter to introduce the procedures and methodology of the study You are according to the descriptive analytical method. The samples were selected by means of two models representing the research community, which consists of the Iraqi educational sites published on the international information network, and then the descriptive analysis was carried out according to a form designed for this purpose after it was modified according to experts' And the methods of scientific research to give the required results and achieve its goal and scientific goal properly and then came Chapter IV and the last to present the most important findings and recommendations and scientific proposals for research
Image compression is very important in reducing the costs of data storage transmission in relatively slow channels. Wavelet transform has received significant attention because their multiresolution decomposition that allows efficient image analysis. This paper attempts to give an understanding of the wavelet transform using two more popular examples for wavelet transform, Haar and Daubechies techniques, and make compression between their effects on the image compression.
In this paper, we introduce three robust fuzzy estimators of a location parameter based on Buckley’s approach, in the presence of outliers. These estimates were compared using the variance of fuzzy numbers criterion, all these estimates were best of Buckley’s estimate. of these, the fuzzy median was the best in the case of small and medium sample size, and in large sample size, the fuzzy trimmed mean was the best.
A new concrete rheometer is introduced including its innovation, actual design, working rules,
calibration, and reliability. A modified design of Tattersall two-point device is created. Some of
components are purchased from local and foreign markets, while other components and the
manufacturing process are locally fabricated. The matching viscosity method of determining the mixer
viscometer constants is demonstrated and followed to relate torque and rotational speed to yield stress
and viscosity (Bingham parameters). The calibration procedures and its calculation are explained.
Water is used as a Newtonian fluid, while; cement paste (cement + water) with w/c ratio equal to
(0.442) is used as a non-Newtonian fluid. Th
بحث لمعرفة رواة السنن والمسانيد للحافظ ابن نقطة
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MoreThe use of deep learning.
Construction of photographed bullying scale of kindergarteners was the aim of this study. The study conducted to answer the raised question, could the bullying among kindergarteners be measured?. A total of (200) boy and girl were selected from city of Baghdad to be the sample of the study. The scale composed of (27) item with colored pictures. It takes about (15) minuets to answer the whole scale items. SPSS tools were used to process the collected data. The result showed that the bullying among kindergarteners could be measured.
Different ANN architectures of MLP have been trained by BP and used to analyze Landsat TM images. Two different approaches have been applied for training: an ordinary approach (for one hidden layer M-H1-L & two hidden layers M-H1-H2-L) and one-against-all strategy (for one hidden layer (M-H1-1)xL, & two hidden layers (M-H1-H2-1)xL). Classification accuracy up to 90% has been achieved using one-against-all strategy with two hidden layers architecture. The performance of one-against-all approach is slightly better than the ordinary approach