Current research targeted: Recognizing the impact of the differentiated education strategy on the achievement of the students of the Institute of Fine Arts / Diyala, for the academic year (2018-2019).
The researcher used the experimental approach designed by two groups (control - experimental) and with a post-test to achieve the goal of the research, and the research sample was chosen from students of the fourth stage for the academic year (2018-2019).
The sample was distributed randomly into two groups, the first experimental consisting of (30) students who studied using the differentiated education strategy, and the second control group consisting of (30) students who studied using the traditional method.
The researcher prepared an achievement test that measures the level of theoretical and technical information about aesthetics subject through objective questions divided into (30) test items with one (score) for the correct answer and (zero) for the wrong or abandoned answer.
The study found the effectiveness of using the differentiated education strategy in raising the level of achievement of the fourth stage students at the Institute of Fine Arts in the subject of aesthetics
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreGrass trimming operation is widely done in Malaysia for the purpose of maintaining highways. Large number of operators engaged in this work encounters high level of noise generated by back pack type grass trimmer used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known. For predicting the work efficiency deterioration, fuzzy tool has been used in present research. It has been established that a fuzzy computing system will help in identification and analysis of fuzzy models fuzzy system offers a convenient way of representing the relationships between the inputs and outputs of a system in the form of IF-THEN rules. The paper presents
... Show MoreBackground: Pain, swelling and trismus are the main minor complications encountered after surgical extraction of impacted third molars, minimizing these postoperative complications is the center of many studies, one proposed method is the prophylactic administration of corticosteroids, the aim of this study is to evaluate the effect of prophylactic Dexamethasone administration on facial swelling and trismus after surgical extraction of impacted third molars. Materials and methods: 20 patients were included in this study, they were randomly divided into 2 groups of 10 patients each; a study group in which patients were given 8 mg. Dexamethasone 1 hour before surgical extraction of impacted third molar and 4 mg. 6 hours postoperatively, and a
... Show MorePhotonic Crystal Fiber Interferometers (PCFIs) are widely used for sensing applications. This work presents the fabrication and study the characterization of a relative humidity sensor based on a polymer-infiltrated photonic crystal fiber that operates in a Mach- Zehnder Interferometer (MZI) reflection mode. The fabrication of the sensor only involves splicing and cleaving Photonic Crystal Fiber (PCF) with Single Mode Fiber (SMF). A stub of (LMA-10) PCF spliced to SMF (Corning-28). In the splice regions. The PCFI sensor operation based on the adsorption and desorption of water vapour at the silica-air interface within the PCF. The sensor shows a high sensitivity to RH variations from (27% RH - 95% RH), with a change in its reflected powe
... Show MoreAbstract
Praise be to Allah and prayers and peace be upon our Prophet, Muhammad, his family and all of his companions,
This research addresses the issue of judge's preaching to the litigants and witnesses; it is a very significant issue since the judge cannot know the insides and facts, but it issues judgments based on the hearings. Since people are originally wrong-doing and ignorant, they, therefore, commit injustice, oppression, false adversarial, and false testimony. However, some people can possibly retreat and return to the right, after being inattentive or recalcitrant, by preaching. This fact led scholars to talk about the judge's preaching to litigant and witnesses and this research is conducted
... Show MoreLinguistic taboos exist in most cultures. Tabooed words are generally being culturespecific
and relating to bodily functions or aspects of a culture that are sacred. Such words are
avoided, considered inappropriate and loaded with affective meaning and failing to adhere to.
Strict rules, often, governing their use and lead to punishment or public shame. These taboo
words can be used as a way of violating social deixis represented by four types of honorifics;
addressee, referent, bystander, and finally setting honorifics. This paper shows how these
taboo words are used in Kenneth Bernard's play La Justice or The Cock that Crew from the
theatre of the Ridiculous as means of violating social deixis in its four types. Th
Since the introduction of the HTTP/3, research has focused on evaluating its influences on the existing adaptive streaming over HTTP (HAS). Among these research, due to irrelevant transport protocols, the cross-protocol unfairness between the HAS over HTTP/3 (HAS/3) and HAS over HTTP/2 (HAS/2) has caught considerable attention. It has been found that the HAS/3 clients tend to request higher bitrates than the HAS/2 clients because the transport QUIC obtains higher bandwidth for its HAS/3 clients than the TCP for its HAS/2 clients. As the problem originates from the transport layer, it is likely that the server-based unfairness solutions can help the clients overcome such a problem. Therefore, in this paper, an experimental study of the se
... Show More