Preferred Language
Articles
/
jperc-87
Media concepts in social studies and national textbooks in public education in light of media education standards and the nature of Saudi society
...Show More Authors

The study aimed to reveal the degree of inclusion of media concepts in the books of social and national studies in general education in light of the criteria of media education and the nature of the Saudi society. Additionally, to identify the estimations of the participants in the study of the importance of including media concepts in these books, and to build a matrix of the range and sequence of media concepts in the books of social and national studies in the grades of Saudi general education. The study followed the descriptive approach in both descriptive analysis of the textbooks and descriptive survey of the study participants who were (203) students in the schools of boys and girls in general education in Makkah. The study used two data collection tools: the content analysis card for textbooks (18 books for students) and the questionnaire of the participants' estimations in the study, as ensuring the validity and reliability of the tools. The data were processed using the statistical program (SPSS) according to a set of appropriate statistical tests. The results of the study led to the preparation of a list of (156) media concepts distributed in (13) fields. The results of the content analysis revealed a very low inclusion of the media concepts in the books of social and national studies. While, the participants' estimations in the study revealed high degree of importance of inclusion of media concepts in those books. In view of this, a model for the matrix of the extent and sequence of the media concepts was designed in the books of social and national studies in Saudi general education.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Improving IoT Applications Using a Proposed Routing Protocol
...Show More Authors

The main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and im

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Apr 24 2022
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Duplex ultrasound surveillance for asymptomatic deep venous thrombosis after total knee joint replacement
...Show More Authors

Background: The prevalence of deep veins thrombosis, complicating total knee replacement in Asian countries, has not been fully appreciated in comparison to western countries as there are few studies on that. There is an important correlation between the evidence of deep veins thrombosis in the lower extremity and likelihood of   pulmonary embolism later one . Because of its noninvasive nature, duplex ultrasound has become one of the initial dependable modality for the cheek out of deep veins thrombosis after total knee replacement  . Therefore, this study was designed to evaluate the outcome of asymptomatic after total knee replacement by duplex ultrasound among Iraqi patients.

Methods: This

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 03 2018
Journal Name
Journal Of Engineering
Variable Structure Control Design for a Magnetic Levitation System
...Show More Authors

In this paper the variable structure control theory is utilized to derive a discontinuous controller to the magnetic levitation system. The magnetic levitation system model is considered uncertain, which subjected to the uncertainty in system parameters, also it is open-loop unstable and strongly nonlinear. The proposed variable structure control to magnetic levitation system is proved, and the area of attraction is determined. Additionally, the chattering, which induced due to the discontinuity in control law, is attenuated by using a non-smooth approximate. With this approximation the resulted controller is a continuous variable structure controller with a determined steady state error according to the selected control

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun May 17 2020
Journal Name
Iraqi Journal Of Science
Bayesian Adaptive Bridge Regression for Ordinal Models with an Application
...Show More Authors

In this article, we propose a Bayesian Adaptive bridge regression for ordinal model. We developed a new hierarchical model for ordinal regression in the Bayesian adaptive bridge. We consider a fully Bayesian approach that yields a new algorithm with tractable full conditional posteriors. All of the results in real data and simulation application indicate that our method is effective and performs very good compared to other methods. We can also observe that the estimator parameters in our proposed method, compared with other methods, are very close to the true parameter values.

View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Sep 05 2019
Journal Name
Al-kindy College Medical Journal
Review Article Blastocystosis
...Show More Authors

Blastocystosis is symptomatic infection caused by the protozoal parasite Blastocystis , which resides in the intestinal tract of its hosts and it is one of the most common parasites reported in humans. It’s prevalence ranges between (30 - 50%) of the population in developing countries. This genus has a worldwide distribution and often the most commonly reported human intestinal protozoan in children and adults, even infect infants

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Proposed Modification to Increase Main Swept Back Wing Efficiency for Aircraft Aermacchi Siai S211
...Show More Authors

A winglet is devices attached at the wing tips, used to improve aircraft wing efficiency by reduction influence wing tips vortices and induct drag, increasing lift force at the wing tips and effective aspect ratio without adding greatly to the structural stress and weight in the wing structure. This paper is presented three-dimensional numerical analysis to proposed modification swept back wing by adding Raked winglets devices at the main wing tips belong the two seat trainer aircraft type Aermacchi Siai S211 by using Fluent ANSYS 13 software. CFD numerical analysis process was performed at the same flight boundary conditions indifferent wing angle of attacks with constant air flow velocity V∞ =50 (m/sec), ambient pressure Po=101325 (P

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of Engineering
Roller compacted concrete: Literature review
...Show More Authors

Roller compacted concrete (RCC) is a material with no slumps and is made from the same raw materials as conventional concrete. The roller compacted dam method, the high paste technique, the corps of engineers method, and the maximum density method are all ways of designing RCC. The evolution of RCC has resulted in a substantial change in construction projects, most notably in dams, because of the sluggish pace of conventional placement, consolidation, and compacting. The construction process was accelerated by incorporating RCC into dams, resulting in a shorter construction period. Research shows that the dams that used RCC had completed one to two years sooner than the dams that used regular concrete (Bagheri an

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Apr 28 2017
Journal Name
جامعة بغداد- كلية اللغات- قسم اللغة العبرية
המבנה המורפולוגי של מונחי המטבח בלשון העברית
...Show More Authors

This research sheds light on the morphological construction of kitchen terms in Hebrew language, especially methods of derivation, by offering an extensive review of the most important methods of morphological derivation. The field of kitchen terms is a fertile and rich field, where we see daily production of new kitchen tools which require suitable names with specific meanings. Morphologically, the research interested in methods of morphological derivation. So as to know and identify the common and effective methods to derive the kitchen terms in Hebrew language, in addition to put a special glossary of these terms. The research found that most of the kitchen terms were derived according to the methods of derivation prevailing in Hebrew la

... Show More
Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Iraqi Journal Of Science
On Semiannahilator Supplement Submodules
...Show More Authors

Let R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes

Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More