Preferred Language
Articles
/
jperc-1201
The extent to which the content of social and national studies courses is included With interactive thinking maps for the stages of public education in the Kingdom of Saudi Arabia
...Show More Authors

The present study aimed to identify the extent to which the content of social and national studies courses was included in interactive thinking maps in the educational stages in the Kingdom of Saudi Arabia, and to achieve the goal of the study, the researcher used the descriptive and analytical approach, and the study tool used consisted of a content analysis card; Where it included a list of the types of thinking maps, where the study sample consisted of all social and national studies courses at the elementary and intermediate levels, and it is (12) books for the student in its first and second parts, and after verifying the validity and reliability of the tool, it was applied to the study sample, and the study reached conclusions, including: The percentage of inclusion focused Thinking maps at the school level, each of the intermediate stage in the first and second semesters (54.9%), followed by the elementary stage (45.1%). The percentage of inclusion of thinking maps at the level of classroom arrangement in the first semester of elementary school ranked first with a percentage (30.6%), and with a high degree of availability, followed by the first and second semester of intermediate school in second place with a percentage (28.9%), (26.0) %), With medium availability, then the rest of the chapters with low availability. The order of thinking maps came in first place: the tree map was ranked first, with a total inclusion percentage in the primary and middle stages (37.0%), with a high degree of availability, then the flow chart came in second place with a percentage (19.7%), with a medium degree of availability, followed by the rest of the thinking maps with a degree Low availability. The study recommended that thinking maps should be included in a balanced and in-depth manner in all social and national studies courses at the different educational stages and more broadly, to conduct similar studies on different educational stages and other decisions. 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jul 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Solving Some Fractional Partial Differential Equations by Invariant Subspace and Double Sumudu Transform Methods
...Show More Authors

      In this paper, several types of space-time fractional partial differential equations has been solved by using most of special double linear integral transform ”double  Sumudu ”. Also, we are going to argue the truth of these solutions by another analytically method “invariant subspace method”. All results are illustrative numerically and graphically.

View Publication Preview PDF
Crossref
Publication Date
Tue Mar 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Study on Flow Characteristics and Heat Transfer Behavior Around Different Geometrical Corrugated Extended Surfaces
...Show More Authors

Abstract

The current study presents numerical investigation of the fluid (air) flow characteristics and convection heat transfer around different corrugated surfaces geometry in the low Reynolds number region (Re<1000). The geometries are included wavy, triangle, and rectangular. The effect of different geometry parameters such as aspect ratio and number of cycles per unit length on flow field characteristics and heat transfer was estimated and compared with each other. The computerized fluid dynamics package (ANSYS 14) is used to simulate the flow field and heat transfer, solve the governing equations, and extract the results. It is found that the turbulence intensity for rectangular extended surface was larg

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
Network Self-Fault Management Based on Multi-Intelligent Agents and Windows Management Instrumentation (WMI)
...Show More Authors

This paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
A review on Activated Carbon Prepared from Agricultural Waste using Conventional and Microwave Activation
...Show More Authors

In the recent years the research on the activated carbon preparation from agro-waste and byproducts have been increased due to their potency for agro-waste elimination. This paper presents a literature review on the synthesis of activated carbon from agro-waste using microwave irradiation method for heating. The applicable approach is highlighted, as well as the effects of activation conditions including carbonization temperature, retention period, and impregnation ratio. The review reveals that the agricultural wastes heated using a chemical process and microwave energy can produce activated carbon with a surface area that is significantly higher than that using the conventional heating method.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
A Lightweight Image Encryption Algorithm Based on Elliptic Curves and a 5D Logistic Map
...Show More Authors

    Cryptography can be thought of as a toolbox, where potential attackers gain access to various computing resources and technologies to try to compute key values. In modern cryptography, the strength of the encryption algorithm is only determined by the size of the key. Therefore, our goal is to create a strong key value that has a minimum bit length that will be useful in light encryption. Using elliptic curve cryptography (ECC) with Rubik's cube and image density, the image colors are combined and distorted, and by using the Chaotic Logistics Map and Image Density with a secret key, the Rubik's cubes for the image are encrypted, obtaining a secure image against attacks. ECC itself is a powerful algorithm that generates a pair of p

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Developing Arabic License Plate Recognition System Using Artificial Neural Network and Canny Edge Detection
...Show More Authors

In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection

... Show More
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Fri Dec 08 2023
Journal Name
Iraqi Journal Of Science
AL-Dibdiba Formation Basin Hydrological Aspects Extraction Using GIS techniques and Quantitative Morphometric Analysis
...Show More Authors

The drainage basin's hydrological aspect studying is considered to be important issue because of their influence (especially in arid to semi-arid regions) on the water management projects, agricultural management projects, and grazing ones. The importance of this study is coming from the fact that AL-Dibdiba formation basin climate is arid to semi-arid and there are human activities (habitation and agricultural) in the east part of it, so the water resources management is needed for this basin. The morphometric analysis illustrates the hydrological aspects in a quantitative form; the problem is the use of the traditional schemes in the calculation processes (such as the topographic map and the planmeter), which coast time and money and a

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 25 2009
Journal Name
Wireless Personal Communications
A N-Radon Based OFDM Trasceivers Design and Performance Simulation Over Different Channel Models
...Show More Authors

In this paper a new method is proposed to perform the N-Radon orthogonal frequency division multiplexing (OFDM), which are equivalent to 4-quadrature amplitude modulation (QAM), 16-QAM, 64-QAM, 256-QAM, ... etc. in spectral efficiency. This non conventional method is proposed in order to reduce the constellation energy and increase spectral efficiency. The proposed method gives a significant improvement in Bit Error Rate performance, and keeps bandwidth efficiency and spectrum shape as good as conventional Fast Fourier Transform based OFDM. The new structure was tested and compared with conventional OFDM for Additive White Gaussian Noise, flat, and multi-path selective fading channels. Simulation tests were generated for different channels

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Al-khwarizmi Engineering Journal
Citric Acid Production: Raw Material, Microbial Production, Fermentation Strategy and Global Market: Critical Review
...Show More Authors

Citric acid is an essential ingredient for the manufacture of (12) key industrial chemicals. Citric acid use is increasing steadily with a high annual growth rate as a result of the development of ever more sophisticated applications. Citric acid is widely utilized in the food and pharmaceutical industries due to its low toxicity when compared to other acidulous. Other uses for citric acid can be found in cleaning supplies and detergents. Based on information from a review of the literature, Citric acid production substrates and methods for surface fermentation, submerged fermentation, solid-state fermentation, and international market expansion are all covered in the current review study. Finally, there is still much to learn about the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref