Summary The objective of the research is to learn the design of a learning educational learning according to the theory of Ausubel in the acquisition of geographical concepts among the students of the fourth primary in the field of geography and the development of their habits of mind. To achieve this, the researcher relied on the two hypotheses the researcher used the design of equal groups the first experimental group was studied according to the design educational educational learning according to the theory and the other is an officer according to the traditional method. The research community consists of fourth grade pupils in primary school day for girls in the Directorate of Education Baghdad, Al-Rusafa, the third academic year 2015-2016. The research sample included (51) where the school of Abdullah bin Abbas represented the experimental group and the number of its students was 25 students. The new generation school was represented by the group of officers and the number of its pupils was 26 pupils. The school consisted of two elementary schools that were deliberately chosen from among the original community schools, Abdullah bin Abbas and the new generation. The researcher prepared a first test to measure the acquisition of concepts included 20 paragraphs of the type of multiple choice and the second measure of the measurement of the habits of the mind consists of (50 paragraphs) distributed on (16) usually and after the statistical treatment with data using the test For two independent samples, the results were as follows: 1 - The pupils of the experimental group that studied the design of learning educational learning according to the theory of Ausubel students in the control group, which studied the usual way to acquire concepts 2 - The superiority of the students of the experimental group studied the design of learning educational learning according to the theory of Ausubel students in the control group in the habits of the mind
This paper includes a comparison between denoising techniques by using statistical approach, principal component analysis with local pixel grouping (PCA-LPG), this procedure is iterated second time to further improve the denoising performance, and other enhancement filters were used. Like adaptive Wiener low pass-filter to a grayscale image that has been degraded by constant power additive noise, based on statistics estimated from a local neighborhood of each pixel. Performs Median filter of the input noisy image, each output pixel contains the Median value in the M-by-N neighborhood around the corresponding pixel in the input image, Gaussian low pass-filter and Order-statistic filter also be used.
Experimental results shows LPG-
... Show MoreThe design, synthesis, and characterization of a star shaped 2,4,6-tris-(4`-carboxyphenoxy)-1,3,5-triazine liquid crystalline with columnar discotic mesophase properties establish H-bond interactions with 3,5-dialkoxypyidine were reported. The structures of the synthesized compounds were actually determined by elementary analysis, and FT-IR, ¹HNMR, ¹³CNMR, and mass spectroscopy. The mesomorphic properties of these mesogens were examined using differential scanning calorimetry (DSC) and optical polarizing microscopy (OPM). The synthesized molecules exhibited enantiotropic hexagonal columnar liquid crystal, which depends for the H- bond complex in a 1:3 ratio.
The rise of Industry 4.0 and smart manufacturing has highlighted the importance of utilizing intelligent manufacturing techniques, tools, and methods, including predictive maintenance. This feature allows for the early identification of potential issues with machinery, preventing them from reaching critical stages. This paper proposes an intelligent predictive maintenance system for industrial equipment monitoring. The system integrates Industrial IoT, MQTT messaging and machine learning algorithms. Vibration, current and temperature sensors collect real-time data from electrical motors which is analyzed using five ML models to detect anomalies and predict failures, enabling proactive maintenance. The MQTT protocol is used for efficient com
... Show MoreIn this study, the response and behavior of machine foundations resting on dry and saturated sand was investigated experimentally. In order to investigate the response of soil and footing to steady state dynamic loading, a physical model was manufactured. The manufactured physical model could be used to simulate steady state harmonic load at different operating frequencies. Total of (84) physical models were performed. The parameters that were taken into considerations include loading frequency, size of footing and different soil conditions. The footing parameters were related to the size of the rectangular footing and depth of embedment. Two sizes of rectangular steel model footing were used (100 200 12.5 mm) and (200 400 5.0 mm).
... Show MoreThis study investigates the feasibility of a mobile robot navigating and discovering its location in unknown environments, followed by the creation of maps of these navigated environments for future use. First, a real mobile robot named TurtleBot3 Burger was used to achieve the simultaneous localization and mapping (SLAM) technique for a complex environment with 12 obstacles of different sizes based on the Rviz library, which is built on the robot operating system (ROS) booted in Linux. It is possible to control the robot and perform this process remotely by using an Amazon Elastic Compute Cloud (Amazon EC2) instance service. Then, the map to the Amazon Simple Storage Service (Amazon S3) cloud was uploaded. This provides a database
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show More