The research aims to build a list of digital citizenship axes and standards and indicators emanating from them, which should be included in the content of the computer textbook scheduled for second grade intermediate students in Iraq, and the analysis of the above mentioned book according to the same list using the descriptive analytical method ((method of content analysis)). The research community and its sample consisted of the content of the computer textbook scheduled for the second year intermediate students for the academic year 2018-2019, and the research tool was built in its initial form after reference to a set of specialized literature and previous studies that dealt with topics related to digital citizenship, and the authenticity of the tool was confirmed. The researcher adopted the idea unit (explicit and implicit) as a unit of analysis, and it was confirmed the validity and stability of the analysis. The research found that the content of the computer textbook scheduled for the second intermediate students dealt with the criteria of digital citizenship in unequal proportions, and did not take into account the balance and regulation, as the proportion of standards (digital behavior, digital communication, digital literacy, digital health and safety, digital security) respectively( 12.11%, 40.36%, 45.29%, 0.45%, 1.79%) in the textbook content, and the content of the book omitted standards (digital access, digital laws, digital trade, digital rights and responsibilities).
We refer in this research into linguistic binaries, try rounding of simiaei news analysis. It is known that there are branches of Linguistics called social Linguistics, divided into communicative Linguistics and media. Perhaps the best justification for the inclusion of a new curriculum in media studies is a semiotic analysis of the news. I›ve turned the speech, language and communication studies in relation to different disciplines, many research projects, and returned only old curriculum, speed shift in thought, proportional to the revolution in information and communication technology, for reality imposed on the entire world, researchers are the first affected by this enormous humanitarian Almanza. Alsimiaaeon still shy away from an
... Show MoreA high percentage of existing buildings in Iraq are traditional buildings, yet there is approximately no such green building in Baghdad or other governorates. Most of these buildings require urgent upgrading to increase their performance (operationally, economically, and environmentally), also the building owners looking for identifying and implementing many of the green building measures to reduce the operational and maintenance costs of their buildings. The decision-makers need to support the possibility of achieving sustainable measures of existing building rating systems such as LEED or BREEAM, and that would require an optimization model. The goal of this study is to maximize the
Analysis system of sports players is very important for individuals in weightlifting. Assessment of player and strength is important for the performance of weightlifting. This paper proposes an analytical method for weightlifters with check-by-frame video. This analysis system can compute the major steps of seven positions in both snatch and clean and jerk methods in frame-video weightlifting monitoring of movements. Each user can compute the major steps of the seven positions of Hu moments among two frames in the video during training, and the Euclidian distance can be computed for the Hu moment values and lifting moment values in the snatch and clean and jerk methods during training. The outcome of the proposed system shows on efficien
... Show MoreThe current research tackles the self-efficacy and its relation to the cognitive assessment for the daily disturbances for the University of Baghdad students. Two criteria have been adopted to achieve the objectives of the research. The sample of this study consists of 200 male and female students who were chosen randomly. The data were analyzed statistically, revealing that the university students owned their own self-efficacy as well as a cognitive assessment for the daily disturbances and they recognized them as self-threatening. The results also indicated the existence of a prediction activity in the field of the cognitive assessment to the daily disturbances selection. In light of the acquired results, the study recommends the neces
... Show Morethere is a need to use the teardown Technique in a various fields and different motives and used often by economic units as a technique to help other techniques for example, used by some economic units for the analysis of other economic units of products in order to work on the development of products and look for opportunities to improve product quality and avoid product errors competitor or reduce its costs, in addition to the services provided by quality control is used ISO 17025 integration with unassembled analysis to adjust the quality of the product by comparing the pieces produced with designed models that are also the product as a whole compared with the original design
... Show MoreThe main object of this article is to study and introduce a subclass of meromorphic univalent functions with fixed second positive defined by q-differed operator. Coefficient bounds, distortion and Growth theorems, and various are the obtained results.
In this paper, third order non-polynomial spline function is used to solve 2nd kind Volterra integral equations. Numerical examples are presented to illustrate the applications of this method, and to compare the computed results with other known methods.
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More