The research aims to build a list of digital citizenship axes and standards and indicators emanating from them, which should be included in the content of the computer textbook scheduled for second grade intermediate students in Iraq, and the analysis of the above mentioned book according to the same list using the descriptive analytical method ((method of content analysis)). The research community and its sample consisted of the content of the computer textbook scheduled for the second year intermediate students for the academic year 2018-2019, and the research tool was built in its initial form after reference to a set of specialized literature and previous studies that dealt with topics related to digital citizenship, and the authenticity of the tool was confirmed. The researcher adopted the idea unit (explicit and implicit) as a unit of analysis, and it was confirmed the validity and stability of the analysis. The research found that the content of the computer textbook scheduled for the second intermediate students dealt with the criteria of digital citizenship in unequal proportions, and did not take into account the balance and regulation, as the proportion of standards (digital behavior, digital communication, digital literacy, digital health and safety, digital security) respectively( 12.11%, 40.36%, 45.29%, 0.45%, 1.79%) in the textbook content, and the content of the book omitted standards (digital access, digital laws, digital trade, digital rights and responsibilities).
Background: Aortic valve stenosis results from minor to severe degrees of aortic valve maldevelopment. This stenosis causes mild to severe obstruction of the left ventricular outflow .
Objectives : to study the immediate and intermediate results of percutaneous balloon aortic valvuloplasty in patients with congenital valvular aortic stenosis .
Type of the study: A prospective study.
Methods: The study was done on thirty five patients with congenital valvular aortic stenosis who had percutaneous balloon aortic valvuloplasty in Ibn Al- Bitar Center for Cardiac Surgery from May 2009 to February 2011.
Results
... Show MoreWith the increased development in digital media and communication, the need for methods to protection and security became very important factor, where the exchange and transmit date over communication channel led to make effort to protect these data from unauthentication access.
This paper present a new method to protect color image from unauthentication access using watermarking. The watermarking algorithm hide the encoded mark image in frequency domain using Discrete Cosine Transform. The main principle of the algorithm is encode frequent mark in cover color image. The watermark image bits are spread by repeat the mark and arrange in encoded method that provide algorithm more robustness and security. The propos
... Show MoreThe use of multimedia technology is growing every day, and it is difficult and time-consuming to provide allowed data while preventing secret information from being used without authorization. The material that has been watermarked can only be accessed by authorized users. Digital watermarking is a popular method for protecting digital data. The embedding of secret data into actual information is the subject of digital watermarking. This paper examines watermarking techniques, methodologies, and attacks, as well as the development of watermarking digital images stored in both the spatial and frequency domains.
In this paper, we study the growth of solutions of the second order linear complex differential equations insuring that any nontrivial solutions are of infinite order. It is assumed that the coefficients satisfy the extremal condition for Yang’s inequality and the extremal condition for Denjoy’s conjecture. The other condition is that one of the coefficients itself is a solution of the differential equation .
The aim of the research is to detect the relation between the fracture sets and systems with the stages of folding. The triple junction area of the research comprises the three faced plunges of three anticlines Bekhair, Brifca and Zawita anticline. GEOreint, ver 9.5.0 was used for analyzing and classifying the data collected from the field measurements on 11 stations in proportion to the orthogonal tectonic axes. The age of exposed rocks ranges from Paleocene up to Miocene. The fractures were represented as joints, veins in addition to different types of faults. The Kinematic analysis of the fractures revealed that the stress caused the (ac) and (hko> a) fractures is coincides with the regional compression stress that form the folds w
... Show MoreThe thermal and electrical performance of different designs of air based hybrid photovoltaic/thermal collectors is investigated experimentally and theoretically. The circulating air is used to cool PV panels and to collect the absorbed energy to improve their performance. Four different collectors have been designed, manufactured and instrumented namely; double PV panels without cooling (model I), single duct double pass collector (model II), double duct single pass (model III), and single duct single pass (model IV) . Each collector consists of: channel duct, glass cover, axial fan to circulate air and two PV panel in parallel connection. The temperature of the upper and
... Show MoreThe EMERGE application from Hampsson-Russell suite programs was used in the present study. It is an interesting domain for seismic attributes that predict some of reservoir three dimensional or two dimensional properties, as well as their combination. The objective of this study is to differentiate reservoir/non reservoir units with well data in the Yamama Formation by using seismic tools. P-impedance volume (density x velocity of P-wave) was used in this research to perform a three dimensional seismic model on the oilfield of Nasiriya by using post-stack data of 5 wells. The data (training and application) were utilized in the EMERGE analysis for estimating the reservoir properties of P-wave ve
... Show MoreZubair oilfield is an efficient contributor to the total Iraqi produced hydrocarbon. Drilling vertical wells as well as deviated and horizontal wells have been experiencing intractable challenges. Investigation of well data showed that the wellbore instability issues were the major challenges to drill in Zubair oilfield. These experienced borehole instability problems are attributed to the increase in the nonproductive time (NPT). This study can assist in managing an investment-drilling plan with less nonproductive time and more efficient well designing.
To achieve the study objectives, a one dimension geomechanical model (1D MEM) was constructed based on open hole log measurements, including Gamma-
... Show MoreThe technology in continuous and quick development, that reflects in all parts of our life and interred both scientific and practical fields. Marketing is one of them, a customer’s way to deal with choosing and demanding the product deferent from the traditional way. Some of the buying processes are electronic now, therefore the current research is identifying the digital channels that entered the world of marketing and influenced the activities and types that fall under this name and how it affects in positioning strategy, which is how to install the product or brand in the mind of the customer and was dimensions (brand identity, brand personality, brand communication, brand awareness, brand image), The researcher took t
... Show MoreAbstract
This research aims to identify the effect of measuring reinforcement (regular - irregular) in gamification upon developing computer skills among secondary education students in the Kingdom of Saudi Arabia. The research experiment was applied on two samples of (68) secondary education students in the Kingdom of Saudi Arabia in the Aurar region. The results revealed there is a significant difference between the experimental group that used (irregular) reinforcement and the control group used (regular) reinforcement in gamification through the post-application of the electronic programming test and through the programming, language skills observing card (Visual Basic Studio).