The research aims to identify the educational values prevailing in the small kinetic games for the children of Riyadh, and to categorize the educational values of the kinetic games small children Riyadh. The research analyzed the content of a number of small kinetic games that included studied physical education at the two pre-kindergarten and stipulated by the Platform for kindergartens, which is being applied. The content analysis was used by analysts agreement with themselves over time (21) days. The agreement between the external researcher and analyst. The researcher used the Cooper to extract equation lab agreement between the researcher and the outside analyst, has reached agreement on determining factor idea and label values (0.83). Statistical methods used by Cooper equation to find consistency and the percentage of the agreement, and analysis of variance for the purpose of knowledge value variables. The researcher found a number of results, including high values of fun and excitement and this illustrates the impact of small kinetic games for children in the contribution of fun to create characters far from depression. By displaying search results to reach to the recommendations, including cognitive emphasis on values in the small motor specialized games for children. Either of the proposals suggested by the researcher, including a pilot study on the impact small kinetic games for children in the process of providing the child with information
This study aims to model the flank wear prediction equation in metal cutting, depending on the workpiece material properties and almost cutting conditions. A new method of energy transferred solution between the cutting tool and workpiece was introduced through the flow stress of chip formation by using the Johnson-Cook model. To investigate this model, an orthogonal cutting test coupled with finite element analysis was carried out to solve this model and finding a wear coefficient of cutting 6061-T6 aluminum and the given carbide tool.
The presented research investigated the pollen morphology of endemic Iraqi Hypericum species. The study revealed phenotypic features of pollen grains in the polar and equatorial views and their quantitative and qualitative characteristics. The results showed that the pollen grains of the genus Hypericum were radially symmetrical and isopolar, and their apertures were simple and tricolporate, except the species H. davisii, distinguished as tetracolprate. Dividing the studied species based on pollen grain sizes comprised two groups. Small pollen grains with an average length of the equatorial view ranged between 10–16 μm in H. lysimachioides and H. vermiculare. Medium-sized pollen grains with an average extent between 17–26 μm e
... Show MoreObjective: To study the protective eff ects of cinnamic acid on dextran sodium sulfate (DSS) induced ulcerative colitis (UC) in mice. Materials and methods. Forty adult male mice were randomLy divided into fi ve groups, control group, an induction group received 3% DSS in drinking water for 7 consecutive days. Two treatment groups received oral suspension of cinnamic acid 50 and 25 mg/kg, respectively and 3% DSS in drinking water, for 7 consecutive days. The fi nal group received oral suspension of cinnamic acid 50 mg/kg for the latter 7 days without DSS in drinking water. All the animals were euthanized on day eight. The colon of animals was extracted and divided into two sections, the middle was homogenized and biochemically analy
... Show MoreThis study produces an image of theoretical and experimental case of high loading stumbling condition for hip prosthesis. Model had been studied namely Charnley. This model was modeled with finite element method by using ANSYS software, the effect of changing the design parameters (head diameter, neck length, neck ratio, stem length) on Charnley design, for stumbling case as impact load where the load reach to (8.7* body weight) for impact duration of 0.005sec.An experimental rig had been constructed to test the hip model, this rig consist of a wood box with a smooth sliding shaft where a load of 1 pound is dropped from three heights.
The strain produced by this impact is measured by using rosette strain gauge connected to Wheatstone
Mishrif Formation is the main reservoir in Amara Oil Field. It is divided into three units (MA, TZ1, and MB12). Geological model is important to build reservoir model that was built by Petrel -2009. FZI method was used to determine relationship between porosity and permeability for core data and permeability values for the uncored interval for Mishrif formation. A reservoir simulation model was adopted in this study using Eclipse 100. In this model, production history matching executed by production data for (AM1, AM4) wells since 2001 to 2015. Four different prediction cases have been suggested in the future performance of Mishrif reservoir for ten years extending from June 2015 to June 2025. The comparison has been mad
... Show MoreCooling towers is one of the most important unit in industry, they are used to dispose heat from cooling media used in the integrated units. The choice of the cooling media plays recently an important rule due to fresh-water scarcity. The use of saline as a cooling media become of growing interest, but the corrosion problem has to be taken in consideration. In this study the simultaneous effect of cooling tower operation parameters on the corrosion rate of mild-steel is considered. The role of NaCl content is found to be pronounced more than the working solution temperature and flowrate. The corrosion of mild-steel in these studied factors had shown an interesting result especially with the NaCl% content. Firstly, there was an increase in t
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More