The research aims to build a list of digital citizenship axes and standards and indicators emanating from them, which should be included in the content of the computer textbook scheduled for second grade intermediate students in Iraq, and the analysis of the above mentioned book according to the same list using the descriptive analytical method ((method of content analysis)). The research community and its sample consisted of the content of the computer textbook scheduled for the second year intermediate students for the academic year 2018-2019, and the research tool was built in its initial form after reference to a set of specialized literature and previous studies that dealt with topics related to digital citizenship, and the authenticity of the tool was confirmed. The researcher adopted the idea unit (explicit and implicit) as a unit of analysis, and it was confirmed the validity and stability of the analysis. The research found that the content of the computer textbook scheduled for the second intermediate students dealt with the criteria of digital citizenship in unequal proportions, and did not take into account the balance and regulation, as the proportion of standards (digital behavior, digital communication, digital literacy, digital health and safety, digital security) respectively( 12.11%, 40.36%, 45.29%, 0.45%, 1.79%) in the textbook content, and the content of the book omitted standards (digital access, digital laws, digital trade, digital rights and responsibilities).
Low incoming discharge upstream of Samarra-Al Tharthar System leads to sediment accumulation and forming islands, especially an island upstream of Al Tharthar Regulator. This island and the sedimentation threaten the stability of the structure and reduce the efficiency of the system. This study aims to hydraulically identify the sedimentation problem mentioned above, to find solutions of how to control the sediment problems, and to develop the capacity of
the system for 500 years return period flood of 15060 m3/s. Surface Water Modeling System (SMS10.1) with two dimensional depth average models (RMA-2) software were used to simulate and analyze the system. The results of analysis showed that the maximum permissible discharge through t
The present work aims to validate the experimental results of a new test rig built from scratch to evaluate the thermal behavior of the brake system with the numerical results of the transient thermal problem. The work was divided into two parts; in the first part, a three-dimensional finite-element solution of the transient thermal problem using a new developed 3D model of the brake system for the selected vehicle is SAIPA 131, while in the second part, the experimental test rig was built to achieve the necessary tests to find the temperature distribution during the braking process of the brake system. We obtained high agreement between the results of the new test rig with the numerical results based on the developed model of the brake
... Show MoreIn this paper, a methodology is presented for determining the stress and strain in structural concrete sections, also, for estimating the ultimate combination of axial forces and bending moments that produce failure. The structural concrete member may have a cross-section with an arbitrary configuration, the concrete region may consist of a set of subregions having different characteristics (i.e., different grades of concretes, or initially identical, but working with different stress-strain diagrams due to the effect of indirect reinforcement or the effect of confinement, etc.). This methodology is considering the tensile strain softening and tension stiffening of concrete in additio
The applications of Multilevel Converter (MLC) are increased because of the huge demand for clean power; especially these types of converters are compatible with the renewable energy sources. In addition, these new types of converters have the capability of high voltage and high power operation. A Nine-level converter in three modes of implementation; Diode Clamped-MLC (DC-MLC), Capacitor Clamped-MLC (CC-MLC), and the Modular Structured-MLC (MS-MLC) are analyzed and simulated in this paper. Various types of Multicarrier Modulation Techniques (MMTs) (Level shifted (LS), and Phase shifted (PS)) are used for operating the proposed Nine level - MLCs. Matlab/Simulink environment is used for the simulation, extracting, and ana
... Show Morecontent Analysis for Some Type of Pillows used in Iraqi houses
Pathology reports are necessary for specialists to make an appropriate diagnosis of diseases in general and blood diseases in particular. Therefore, specialists check blood cells and other blood details. Thus, to diagnose a disease, specialists must analyze the factors of the patient’s blood and medical history. Generally, doctors have tended to use intelligent agents to help them with CBC analysis. However, these agents need analytical tools to extract the parameters (CBC parameters) employed in the prediction of the development of life-threatening bacteremia and offer prognostic data. Therefore, this paper proposes an enhancement to the Rabin–Karp algorithm and then mixes it with the fuzzy ratio to make this algorithm suitable
... Show MoreIn the present work a dynamic analysis technique have been developed to investigate and characterize the quantity of elastic module degradation of cracked cantilever plates due to presence of a defect such as surface of internal crack under free vibration. A new generalized technique represents the first step in developing a health monitoring system, the effects of such defects on the modal frequencies has been the main key quantifying the elasticity modulii due to presence any type of un-visible defect. In this paper the finite element method has been used to determine the free vibration characteristics for cracked cantilever plate (internal flaws), this present work achieved by different position of crack. Stiffness re
... Show MoreIn recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show MoreIn this paper, third order non-polynomial spline function is used to solve 2nd kind Volterra integral equations. Numerical examples are presented to illustrate the applications of this method, and to compare the computed results with other known methods.