A field study aimed at identifying the sources of mutual complaints among the Directorates of Education staff of their departments and management and run it in their daily dealings with principals in the province of Baghdad, and adopt approach. It was determined the research consists of (2357) male and female employees and 305 randomly stratified simple by the rate of (7%) from the research community as the number of sample reached (167) male and female employees, and selected sample was randomly stratified simple by the rate of (39.67%) of the research community, as the number of sample was (121) principals. It was constructed two questionnaires, the first included (28) items and the second contained (28) items. And the two researchers made sure of their validity and reliability. Results were analyzed by statistical software (SPSS), the two questioners were applied in the second semester of the academic year 2015-2016. The study has found the following results: the sources of complaint suffered by school principals are sharper and larger than those of complaints suffered by the Directorates of Education staff, and the depth and size of the reasons which were characterized by the principles are bigger little about from those identified by the Directorates of Education staff, and the research has made a number of recommendations and suggestions.
In this paper, a design of the broadband thin metamaterial absorber (MMA) is presented. Compared with the previously reported metamaterial absorbers, the proposed structure provides a wide bandwidth with a compatible overall size. The designed absorber consists of a combination of octagon disk and split octagon resonator to provide a wide bandwidth over the Ku and K bands' frequency range. Cheap FR-4 material is chosen to be a substate of the proposed absorber with 1.6 thicknesses and 6.5×6.5 overall unit cell size. CST Studio Suite was used for the simulation of the proposed absorber. The proposed absorber provides a wide absorption bandwidth of 14.4 GHz over a frequency range of 12.8-27.5 GHz with more than %90 absorp
... Show MoreThe current study was designed to explore the association between the pigments production and biofilm construction in local Pseudomonas aeruginosa isolates. Out of 143 patients suffering from burns, urinary tract infections (UTI), respiratory tract infections and cystic fibrosis obtained from previous study by Mahmood (2015), twenty two isolates (15.38%) were identified from (11) hospitals in Iraq, splitted into three provinces, Baghdad, Al-Anbar and Karbala for the duration of June 2017 to April 2018. Characterization was carried out by using microscopical, morphological and biochemical methods which showed that all these isolates belong to P. aeruginosa. Screening of biofilm production isolates was carried out by usi
... Show MoreThe city is a built-up urban space and multifunctional structures that ensure safety, health and the best shelter for humans. All its built structures had various urban roofs influenced by different climate circumstances. That creates peculiarities and changes within the urban local climate and an increase in the impact of urban heat islands (UHI) with wastage of energy. The research question is less information dealing with the renovation of existing urban roofs using color as a strategy to mitigate the impact of UHI. In order to achieve local urban sustainability; the research focused on solutions using different materials and treatments to reduce urban surface heating emissions. The results showed that the new and old technologies, produ
... Show More<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In
... Show MoreThis study employs wavelet transforms to address the issue of boundary effects. Additionally, it utilizes probit transform techniques, which are based on probit functions, to estimate the copula density function. This estimation is dependent on the empirical distribution function of the variables. The density is estimated within a transformed domain. Recent research indicates that the early implementations of this strategy may have been more efficient. Nevertheless, in this work, we implemented two novel methodologies utilizing probit transform and wavelet transform. We then proceeded to evaluate and contrast these methodologies using three specific criteria: root mean square error (RMSE), Akaike information criterion (AIC), and log
... Show MoreDie Forschung geht um das wichtigste Thema für die literarischen Studien, die um die literarische Übersetzung und die Deutlichkeit dem Leser gekreist sind. Die literarische Übersetzung ist ein schwieriger Prozess, der auf vielseitigen Faktoren beruht ist, damit es erfolgreich gelungen ist. Dies ist auch ein gemeinsamer Prozess durch das Kunstwerk zwischen dem Autor und Übersetzer, so dass der erste Schritt in der vorliegenden Forschung wie folgendes lautet: muss es der Autor genau bestimmt wird, wie er die methodischen Grundprinzipien des Wekes im Dienst der zentralen Idee formuliert, und wie er die literarische Gestalt durch die voll erfassende Vorstellung des Wekes dichtet. Denn die literarische Arbeit besteht aus zwei Teilen
... Show MoreIn the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreCyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show More