The research aims at evaluating the illustrations images and determining the availability of good image standards in the illustrations images of the content of the second intermediate stage computer's book for the academic year (2019-2020) as seen by computer teachers. The sample was randomly selected, (30) teachers who are actually teaching the subject in schools within the geographical area of the province of Baghdad (Karkh III). To achieve this goal, ten standards were identified: scientific accuracy, suitability for the level of students, image clarity, image freshness, quality of coloring, suitability of its location of the subject, Matching their content glimpsed, The subject matter is appropriate in terms of area, matching its title to its content, the quality of visas, to know the strengths and strengthening and reduce the severity of weaknesses or eliminated by making proposals to improve them. The results revealed that the illustrations images in the content of the second-grade computer book did not take into account the good image standards in balanced proportions, where the scientific accuracy was (80%), which is a very good evaluation, and the standard percentage is suitable for the level of students (52%)The standard of image clarity was (57.3%), which is an acceptable evaluation grade, the standard of modernity of the image (74%) was a good evaluation, and the percentage of the color quality criterion (68%) was an average evaluation and the appropriate standard of its location. The percentage of the subject (67%) and when compared to the agreed rate came with an average evaluation, while the criterion of conformity of its content to the contents of the subject has achieved a rate (75%), a good evaluation, while the criterion of suitability in terms of area achieved (55%) Acceptable evaluation, the criterion of conformity of its title to its content by (56%), i.e. the degree of acceptable evaluation, and the standard of quality of visas achieved (58%). to conclude, the researcher came out with a number of recommendations and suggestions.
Community detection is an important and interesting topic for better understanding and analyzing complex network structures. Detecting hidden partitions in complex networks is proven to be an NP-hard problem that may not be accurately resolved using traditional methods. So it is solved using evolutionary computation methods and modeled in the literature as an optimization problem. In recent years, many researchers have directed their research efforts toward addressing the problem of community structure detection by developing different algorithms and making use of single-objective optimization methods. In this study, we have continued that research line by improving the Particle Swarm Optimization (PSO) algorithm using a
... Show MoreBackground: COVID-19 is a disease that started in Wuhan/China in late 2019 and continued through 2020 worldwide. Scientists worldwide continue to research to find vaccines, treatments, and medication for this disease. Studies also conenue to find the pathogenicity and epidemiology mechanisms. Materials and Methods: In this work, we analyzed cases obtained from Alshifaa center in Baghdad/Iraq for 23/2/2020-31/5/2020 with total instances of 797, positive cases of 393, and death cases of 30. Results: Results showed that the highest infection cases were among people aged between 41-45. Also, it was found that males' number of cases was more than females. In contrast, death cases were significantly higher in males than females. It was not
... Show MoreInelastic transverse magnetic dipole electron scattering form
factors in 48Ca have been investigated through nuclear shell model
in an excited state energy Ex= 10.23 MeV which is so called
"mystery case" with different optional choices like effective
interaction, restricted occupation and core polarization interaction.
40Ca as an inert core will be adopted and four orbits with eight
particles distributed mainly in 2p1f model space and in some extend
restricted to make sure about the major accuse about this type of
transition. Theoretical results have been constituted mainly with
experimental data and compared with some important theoretical
results of the same transition.
The present work folds two qualitative objectives; the first focuses on investigating the multiplicity of motivation-based human needs in Little Bee. The second objective involves examining the linguistic forms adopted to disclose such needs. Consequently, the researchers are to adapt eclectically Alderfer's Existence, Relatedness, and Growth Theory (1969) and Langacker’s theory of Domains (1987) together with his Active Zone Operation (1991). Such a study helps to embody the connectivity between the social and psychological aspects, and the way these two aspects are disclosed using particular linguistic The study has concluded that Bee needed Alderfer’s basic human needs: existence, relatedness, and growth. Besides, satisfying
... Show MoreLeft ventricular hypertrophy (LVH) caused by high blood pressure is linked to increased mortality and arrhythmia risk. This study aimed to evaluate arrhythmia in hypertensive patients due to left ventricular hypertrophy (LVH). A cross-sectional study was performed, assessing participants' blood pressure, echocardiography and electrocardiography, and Holter monitoring in certain cases. There were 300 hypertensive patients >18 years attending the cardiology unit of Baghdad medical city. The study was conducted between January–June 2022. The electrocardiograms at rest for 300 adults with hypertension were investigated. 130 (43.5%) were females, and 170 (56.5%) were males. The mean age of participants was 58 years. Forty-nine (16.3
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show More