A common problem facing many Application models is to extract and combine information from multiple, heterogeneous sources and to derive information of a new quality or abstraction level. New approaches for managing consistency, uncertainty or quality of Arabic data and enabling e-client analysis of distributed, heterogeneous sources are still required. This paper presents a new method by combining two algorithms (the partitioning and Grouping) that will be used to transform information in a real time heterogeneous Arabic database environment
The study aimed to find out the degree of practicing Arabic language teachers in the preparatory stage of higher-order thinking skills from their point of view in the first, second and third Baghdad Rusafa directorates of education. The descriptive survey method was used. The study population consisted of teachers of the Arabic language in the directorates of Baghdad, Rusafa, First, Second and Third, and the sample number was (284) teachers. A questionnaire was built on higher-order thinking skills. The validity and reliability of the tool were verified, after which the scale was applied to the research sample of (116) schools and (168) teachers who were randomly selected from the schools affiliated to the Baghdad Education Directorates Rus
... Show MoreSome may think that the games, especially the folk games, are just a means of entertainment and fun and children may resort to them to alleviate the tension they are experiencing at home or school, but the truth is that they carry values and meanings that can be invested in education because they contribute to the development of the personality of the child and enhance self- confidence. The objective of the research is to learn how to use folk games to develop children's acting and performance skills in the kindergartens.
The research included a theoretical introduction of three sections: the first section: education through play. The second section: the folk tale and the development of imagination and the
... Show MoreExperiments were conducted to study the behavior of the solid particles (proppant) inside the hydraulic fracture during the formation stimulation, and study the effect of the proppant concentration on the hydraulic fracturing process, which lead to bridge and screen-out conditions inside the fractures across the fracture width that restricts fracturing fluid to flow into the hydraulic fracture. The research also studies the effect of the ratio between the fracture size and the average particles diameter “proppant", on fracture bridging. In this study two ratios were considered β= 2 and 3 ,where β=Dt / Dp where: Dt= hydraulic fracture size (width) and Dp=Average particles diameter.
This work pr
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThis paper deals with the numerical solution of the discrete classical optimal control problem (DCOCP) governing by linear hyperbolic boundary value problem (LHBVP). The method which is used here consists of: the GFEIM " the Galerkin finite element method in space variable with the implicit finite difference method in time variable" to find the solution of the discrete state equation (DSE) and the solution of its corresponding discrete adjoint equation, where a discrete classical control (DCC) is given. The gradient projection method with either the Armijo method (GPARM) or with the optimal method (GPOSM) is used to solve the minimization problem which is obtained from the necessary conditi
... Show More
This study is concerned with shedding light on the grammatical method of Ibn Hisham Al-Ansari (761 AH), in his explanation of Bant Souad’s poem by the poet Kaab bin Zuhair, and I included a brief description of Ibn Hisham’s life with a number of explanations of this poem, then clarified the most important features of this method The grammar represented by his reliance on hearing and presenting it to analogy with mention of types of analogy, as well as his attribution of opinions to their owners with weighting, selection and balancing, and his attention to reasoning and a number of grammatical ailments, and his approach is also distinguished by following the method of fractal.
... Show More
Abstract The success of the system of government in any country needs to have a handle on the amount of power efficiency , capacity , capability and wisdom, Iraq has gone through since its inception through several stages of time, namely: The first stage: which ran from August 23, 1921 until July 14, 1958 and was ruling monarchy (rule of the royal family) and punishing power of political elites both of them and works access to power without taking into consideration the laws and principles of the Constitution, and as a result of the inability of civilian powers and political parties access to power to grant that army officers regulatory and disciplinary specifications as well as possessing arms and overthrow the rule of the minority coup
... Show MoreThe study aims at finding out the effect of the lead time strategy on the first intermediate class pupils' achievement in geography The partial experimental design of two groups, experimental and control, with pre-post tests is used. The sample is represented in (73) female pupils. The sample is divided into two groups (37) experimental group and (36) control one. The sam ple is selected from first intermediate class pupils ( Al Batol intermediate school for girls) Baghdad Al-karkh-3, for academic year 2015-2016 The researcher has equalized the two groups in several variables: the previous achievement tests, intelligence, age in months, the scores of geography test of first course