The study aims to identify the degree of Tabuk University practices to raise the intellectual awareness of students through scientific research, as well as to identify the degree of Tabuk University practicing to raise the intellectual awareness through the educational process (faculty member – activities). The study also seeks to identify the degree of Tabuk University practicing to raise the intellectual awareness of students through community service and university media. The study is descriptive in nature that employed the questionnaire as a tool in collecting data. Total of (540) students were chosen randomly from different colleges at universities of Tabuk to form the study sample. The results showed that faculty member has pract
... Show MoreBackground: Background: Diabetes mellitus is a life-threatening disease. Global prevalence of diabetes mellitus is increasing rapidly providing a worrying indication and major threat to global health unless interventions are created through community awareness and knowledge regarding different aspect of DM.
Aims: To assess the level of awareness regarding diabetes risk factors, prevention and management among community members in Baqubah city and to identify any association between awareness level and some variables.
Methods: Across sectional study was carried out from the 1st of January - 30th of November 2019 in all primary health care centers (six centers) in center of Baqubah city. A convenien
... Show MoreBac kground:
Failure is the state or condition of not meeting a desirable or intended objective, and may be viewed as the opposite of success; students always have a question "Why did I get this grade. On the contrary success leads towards new sources of earning, in fact there are a lot of interacting factors play such extrinsic and extrinsic to reach success.
Objec t i ves :
To explore internal and external factors causing students failure in medical college and to reconnoiter factors improve academic performance.
Methods: A cross-sectional study, conducted in Al Kindy College of Medicine, for the period from November 8th 2012 to May 1st 2013. Formal ethical considerations were obtained about participation and methodology. A
Deep beams are used in wide construction fields such as water tanks, foundations, and girders in multi-story buildings to provide certain areas free of columns. In practice it is quite often occurring to create web opening in deep beams to supply convenient passage of ventilation ducts, cable channels, gas and water pipes. Experimental studies of ten 10 deep beams were carried out, where two of them are control specimens without openings and eight with large web openings in the shear spans. The variables that have been adopted are the ratio of the shear span to the overall depth of the member cross-section, location and dimensions of the opening. Test results showed that there was a decrease in the load carrying capacity of deep bea
... Show MoreDeep beams are used in wide construction fields such as water tanks, foundations, and girders in multi-story buildings to provide certain areas free of columns. In practice it is quite often occurring to create web opening in deep beams to supply convenient passage of ventilation ducts, cable channels, gas and water pipes. Experimental studies of ten 10 deep beams were carried out, where two of them are control specimens without openings and eight with large web openings in the shear spans. The variables that have been adopted are the ratio of the shear span to the overall depth of the member cross-section, location and dimensions of the opening. Test results showed that there was a decrease in the load carrying capacity of deep bea
... Show MoreHorizontal wells have revolutionized hydrocarbon production by enhancing recovery efficiency and reducing environmental impact. This paper presents an enhanced Black Oil Model simulator, written in Visual Basic, for three-dimensional two-phase (oil and water) flow through porous media. Unlike most existing tools, this simulator is customized for horizontal well modeling and calibrated using extensive historical data from the South Rumaila Oilfield, Iraq. The simulator first achieves a strong match with historical pressure data (1954–2004) using vertical wells, with an average deviation of less than 5% from observed pressures, and is then applied to forecast the performance of hypothetical horizontal wells (2008–2011). The result
... Show MoreAmong the undesirable effects of soil compaction is a measurable reduction in plant growth and crop yield. The prevailing belief is that compacted tillage pans are caused by repetitive farming practices, heavy tractors, tillage tools, and field traffic. This experiment was conducted to determine and map the hardpan layers across an agricultural field through advanced technologies of precision agriculture. These valuable techniques such as data logger, yield map, and data analysis of performance indicators were linked with accurate global positioning systems (GPS) datasets. These important technologies provided the farmers and helped them to identify and manage areas of the fields with higher compacted layers. Three ground speeds 4.3
... Show MoreAlthough text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m
... Show MoreIn this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP
With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show More