The study aims at explaining the extent to which the principles of educational management reform contribute to Ibn Ashour in achieving educational management reform and the extent to which the pillars of the Kingdom's Vision 2030 in the field of Education in achieving the educational management reform. The study also aims to provide a future vision of what the educational administrative reform and its results should be in the Kingdom during the next ten years. To achieve the goals of the study, the researcher followed two approaches: on the theoretical side, he relied on applying the content analysis method. As for the applied side, the researcher adopted the Delphi method by two questionnaires to ask (36) participants from the experts and specialists. The results revealed that there is a consensus between the principles of educational administrative reform in Ibn Ashour and the pillars of Saudi Arabia’s Vision 2030 by Expert view. Moreover, there is future feasibility for the educational administrative reform in accordance with the principles of the educational administrative reform at Ibn Ashour and the pillars of Saudi Arabia's vision 2030 from the expert point of view. The study recommended that Ibn Ashour's vision for educational reform be included in the frameworks and references of the vision in the field of education development, and research on the possibility of benefiting from the application of a way and procedures to achieve the future vision that Presented by the study, and its transformation from the theoretical to the practical and applied levels.
This study delves into the design optimization of a hydropower harvesting system, exploring various parameters and their influence on system performance. By modifying the variables within the model to suit different flow conditions, a judiciously optimized design is attainable. Notably, the lift force generated is found to be intricately linked to the strategic interplay of the bluff body's location, cylinder dimensions, and flow velocity. The findings culminate in the establishment of empirical equations, one for lift force and another for displacement, based on the force equation. Many energy harvesting approaches hinge on the reciprocating motion inherent to the structural system. The methodology developed in this study emerges as a pot
... Show MoreThe aim of this book is to present a method for solving high order ordinary differential equations with two point boundary condition of the different kind, we propose semi-analytic technique using two-point osculatory interpolation to construct polynomial solution. The original problem is concerned using two-points osculatory interpolation with the fit equal numbers of derivatives at the end points of an interval [0 , 1] . Also, we discussion the existence and uniqueness of solutions and many examples are presented to demonstrate the applicability, accuracy and efficiency of the methods by compared with conventional method .i.e. VIDM , Septic B-Spline , , NIM , HPM, Haar wavelets on one hand and to confirm the order convergence on the other
... Show MoreThe current research deals with practical studies that explain to the Iraqi consumer multiple instances about the phenomenon of water hammer which occur in the water pipeline operating with pressure. It concern a practical study of the characteristics of this phenomenon and economically harmful to the consumer the same time. Multiple pipe fittings are used aimed to reduce this phenomenon and its work as alternatives to the manufactured arresters that used to avoid water hammer in the sanitary installations, while the consumer did not have any knowledge as to the non-traded for many reasons, including the water pressure decreases in the networks and the use of consumer pumps to draw water directly from the network. Study found a numbe
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreThe aim of the current study was to evaluate the knowledge and perception of the fifth stage pharmacy students (college of pharmacy/ University of Baghdad /Iraq) regarding generic medicines. This study is a cross-sectional study carried in a college of pharmacy /University of Baghdad during the period from (November 2018- March 2019). The number of students included in the current study was 168 undergraduate stager pharmacists. A questionnaire was used to collect data of the study. Nearly 86% of the students said that they had heard of generic and brand medicines, and pharmacy was the main source of knowledge regarding generic medicines (66.7%). About (33.3%) of the respondents agreed that generic medicines are bioequivalent to br
... Show MoreThe characteristic of our time is the tremendous technological progress and the wide use of the Internet. Children have had a large share of this progress.as they are becoming fond of having the technological equipment of tablets and mobile phones which become indispensable for these children cannot do without them .
Recently, the phenomenon of using mobile phones and tablets by children has become more widespread, and the society in general and parents, in particular, have ignored the reasons for their health .Despite the many advantages and benefits for children who are well trained to use these devices properly that have enhanced their cognitive and social abilities, there are many disadvantages that could harm children's growth if