The present study aimed to identify the extent to which the content of social and national studies courses was included in interactive thinking maps in the educational stages in the Kingdom of Saudi Arabia, and to achieve the goal of the study, the researcher used the descriptive and analytical approach, and the study tool used consisted of a content analysis card; Where it included a list of the types of thinking maps, where the study sample consisted of all social and national studies courses at the elementary and intermediate levels, and it is (12) books for the student in its first and second parts, and after verifying the validity and reliability of the tool, it was applied to the study sample, and the study reached conclusions, including: The percentage of inclusion focused Thinking maps at the school level, each of the intermediate stage in the first and second semesters (54.9%), followed by the elementary stage (45.1%). The percentage of inclusion of thinking maps at the level of classroom arrangement in the first semester of elementary school ranked first with a percentage (30.6%), and with a high degree of availability, followed by the first and second semester of intermediate school in second place with a percentage (28.9%), (26.0) %), With medium availability, then the rest of the chapters with low availability. The order of thinking maps came in first place: the tree map was ranked first, with a total inclusion percentage in the primary and middle stages (37.0%), with a high degree of availability, then the flow chart came in second place with a percentage (19.7%), with a medium degree of availability, followed by the rest of the thinking maps with a degree Low availability. The study recommended that thinking maps should be included in a balanced and in-depth manner in all social and national studies courses at the different educational stages and more broadly, to conduct similar studies on different educational stages and other decisions.
To improve the efficiency of a processor in recent multiprocessor systems to deal with data, cache memories are used to access data instead of main memory which reduces the latency of delay time. In such systems, when installing different caches in different processors in shared memory architecture, the difficulties appear when there is a need to maintain consistency between the cache memories of different processors. So, cache coherency protocol is very important in such kinds of system. MSI, MESI, MOSI, MOESI, etc. are the famous protocols to solve cache coherency problem. We have proposed in this research integrating two states of MESI's cache coherence protocol which are Exclusive and Modified, which responds to a request from reading
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection
... Show MorePhotodetector based on Rutile and Anatase TiO2 nanostructures/n-Si Heterojunction
In this paper a new method is proposed to perform the N-Radon orthogonal frequency division multiplexing (OFDM), which are equivalent to 4-quadrature amplitude modulation (QAM), 16-QAM, 64-QAM, 256-QAM, ... etc. in spectral efficiency. This non conventional method is proposed in order to reduce the constellation energy and increase spectral efficiency. The proposed method gives a significant improvement in Bit Error Rate performance, and keeps bandwidth efficiency and spectrum shape as good as conventional Fast Fourier Transform based OFDM. The new structure was tested and compared with conventional OFDM for Additive White Gaussian Noise, flat, and multi-path selective fading channels. Simulation tests were generated for different channels
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
Efficient operations and output of outstanding quality distinguish superior manufacturing sectors. The manufacturing process production of bending sheet metal is a form of fabrication in the industry of manufacture in which the plate is bent using punches and dies to the angle of the work design. Product quality is influenced by plate material selection, which includes thickness, type, dimensions, and material. Because no prior research has concentrated on this methodology, this research aims to determine V-bending capacity limits utilizing the press bending method. The inquiry employed finite element analysis (FEA), along with Solidworks was the tool of choice to develop drawings of design and simulations. The ASTM E290
... Show MoreRecently Tobit Quantile Regression(TQR) has emerged as an important tool in statistical analysis . in order to improve the parameter estimation in (TQR) we proposed Bayesian hierarchical model with double adaptive elastic net technique and Bayesian hierarchical model with adaptive ridge regression technique .
in double adaptive elastic net technique we assume different penalization parameters for penalization different regression coefficients in both parameters λ1and λ2 , also in adaptive ridge regression technique we assume different penalization parameters for penalization different regression coefficients i
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show More