Abstract: This research deals with the developing of power and different abilities (military, security, economy, technology and scientific excellence) The research shows that the excellence of the Chinese economy and its development , had a positive reflection on the other powers and abilities , it means it is a base of development in all fields. The development in power and Chinese military abilities had a clear effect on Chinese strategic creed , and that what the research deals with in some details. The research also deals with developing Chinese nuclear abilities. The research doesn't ignore the security eye that indicates to the protection of the state sovereignty, concentrating on the unity and safety Chinese lands. The research also deals with the Chinese power and abilities in their two parts internal and external , at the internal level , the Chinese economic development has been noticed through different stages , also dealing with the decisions the lead to this development, at the level of power and external abilities , the research indicated to (BRICS , BRI) as an example of this power and abilities, the research didn't forget the power an technology abilities and Chinese scientific excellence , and its path by creating researches centers for developing , training and cooperating with the researchers, and how to close the gap that separates China from the west , the research also indicates to the development of space technology.
Sensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte
... Show MoreProject management are still depending on manual exchange of information based on paper documents. Where design drawings drafting by computer-aided design (CAD), but the data needed by project management software can not be extracted directly from CAD, and must be manually entered by the user. The process of calculation and collection of information from drawings and enter in the project management software needs effort and time with the possibility of errors in the transfer and enter of information. This research presents an integrated computer system for building projects where the extraction and import quantities, through the interpretation of AutoCAD drawing with MS Access database of unit costs and productivities for the pricing and
... Show MoreThe current research seeks to Analyze third intermediate chemistry book following sustainable development standards for academic year (2016-2017). To do this, a list of sustainable development standards that should be included in chemistry book was designed based on the previous studies. The first version of the list consisted of (50) sub-case divided into three standards (social, economic, and environmental) which was exposed to group of experts in teaching chemistry and teaching methods. The list has modified to (43) sub-case. The researcher followed the implicit and explicit meaning in his analysis: one for recording and repetition and the other for frequency. The result showed that third intermediate chemistry book has achieved (20)
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
Abstract
Oil is the most important natural resources in Iraq and represents the goal to others as well as Iraqi people. It is gift from God to all Iraqi people now and future. So we must maintain it and invest its revenue that achieve development in country and ensure the next generations' rights in it without external costs or negative externalities from extracted and invested it.
The most problems that we attempt to solve by this research are the exhausted, environmental degradation and theft from next generation that produced with oil contracts between Iraq and foreign companies. From here was th
... Show MoreThis study investigated three aims for the extent of effectiveness of the two systems in educational development of educators. To achieve this, statistical analysis was performed between the two groups that consisted of (26) participants of the electronic teaching method and (38) participants who underwent teaching by the conventional electronic lecture. The results indicated the effectiveness of the “electronic teaching method” and the “electronic lecture method” for learning of the participants in educational development. Also, it indicated the level of equivalence from the aspect of effectiveness of the two methods and at a confidence level of (0.05). This study reached several conclusions, recommendations, and suggestio
... Show MoreThe research aims to characterize the strategic plan of the Educational Professional Development Center, to reveal the most important training needs for teachers from this center, to reveal the extent to which this center meets those needs, and to identify the differences between teacher responses about the degree of importance, availability of those needs according to variables of sex, specialization, and years of experience. This descriptive study adopted a questionnaire applied to (256) teachers in the K.S.A. The results of the study showed that all training needs ranged in the degree of importance from large to very large and that the most important were the skills associated with communicating with members of the learning community.
... Show More