The present study aimed to identify the extent to which the content of social and national studies courses was included in interactive thinking maps in the educational stages in the Kingdom of Saudi Arabia, and to achieve the goal of the study, the researcher used the descriptive and analytical approach, and the study tool used consisted of a content analysis card; Where it included a list of the types of thinking maps, where the study sample consisted of all social and national studies courses at the elementary and intermediate levels, and it is (12) books for the student in its first and second parts, and after verifying the validity and reliability of the tool, it was applied to the study sample, and the study reached conclusions, including: The percentage of inclusion focused Thinking maps at the school level, each of the intermediate stage in the first and second semesters (54.9%), followed by the elementary stage (45.1%). The percentage of inclusion of thinking maps at the level of classroom arrangement in the first semester of elementary school ranked first with a percentage (30.6%), and with a high degree of availability, followed by the first and second semester of intermediate school in second place with a percentage (28.9%), (26.0) %), With medium availability, then the rest of the chapters with low availability. The order of thinking maps came in first place: the tree map was ranked first, with a total inclusion percentage in the primary and middle stages (37.0%), with a high degree of availability, then the flow chart came in second place with a percentage (19.7%), with a medium degree of availability, followed by the rest of the thinking maps with a degree Low availability. The study recommended that thinking maps should be included in a balanced and in-depth manner in all social and national studies courses at the different educational stages and more broadly, to conduct similar studies on different educational stages and other decisions.
The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere
... Show MoreA study of some mite species of alfalfa. wheat, and barley was conducted in central Iraq.
The mites were extracted using a tullgren funnel method. Twelve species were recorded. 10 of
them belong to suborder Trombidiformes and 2 belong to suborder Sarcoptiforms. Three
mites, Irnpar(pes hystricinus, Scutacarus longitarsus, and Rhizoglyphus echin opus are new
records for Iraqi mite fauna, and 11 are new host records in alfalfa soil.
Facial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no
... Show MoreObjective: To conduct a standardized method for cavity preparation on the palatal surface of rat maxillary molars and to introduce a standardized method for tooth correct alignment within the specimen during the wax embedding procedure to better detect cavity position within the examined slides. Materials and methods: Six male Wistar rats, aged 4-6 weeks, were used. The maxillary molars of three animals were sectioned in the frontal plane to identify the thickness of hard tissue on the palatal surface of the first molar which was (250-300µm). The end-cutting bur (with a cutting head diameter of 0.2mm) was suitable for preparing a dentinal cavity (70-80µm) depth. Cavity preparation was then performed using the same bur on the tooth
... Show MoreObjective: To conduct a standardized method for cavity preparation on the palatal surface of rat maxillary molars and to introduce a standardized method for tooth correct alignment within the specimen during the wax embedding procedure to better detect cavity position within the examined slides. Materials and methods: Six male Wistar rats, aged 4-6 weeks, were used. The maxillary molars of three animals were sectioned in the frontal plane to identify the thickness of hard tissue on the palatal surface of the first molar which was (250-300µm). The end-cutting bur (with a cutting head diameter of 0.2mm) was suitable for preparing a dentinal cavity (70-80µm) depth. Cavity preparation was then performed using the same bur on the tooth surf
... Show MoreThe fact of having Journalism being open to people from different orientations professions, working as journalists requiring protection just to spread corruption, is one of the biggest threats faced by journalism.
Journalists noticed the spread of unprincipled journalists with no journalistic ethics amongst them, they tried to protect their profession from these corrupt outsiders who might annihilate the mighty of journalism. The principles of the journalism profession known as journalistic ethics, are one the most important formulations of the law concluded by the journalists and those concerned by the the profession, they were then published in public in order to prove their professionalism, especially for those who don’t und
... Show MoreThe problem with the research essential questionably is: (What are the variations phenotypic designs decorative Alangat) The research aims detection of phenotypic variables and Acgalah in Wares structure decorative employee in the decorative designs in the external and internal interfaces to the tombs of the Iraqi holy shrines and the walls of b (upper threshold _ Najaf) Alattabatin Husseinia and Abbasid in the holy city of Karbala) current position (1435 AH / 2014 AD). And ensure that the theoretical framework topics following: diversity in the structure motifs and vegetable processors color as well as landmarks decking decorative decorative gift items and adopted a researcher at the procedures purely on the descriptive analytical appro
... Show MoreUsing the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through that region. The result
... Show More