Abstract
The study aims to reveal the level of inclusion of citizenship values in the English language textbooks (We Can) series for elementary education in the Kingdom of Saudi Arabia. To achieve this objective, the "content analysis" methodology was used. A content analysis card was designed to include (6) main areas of citizenship values, it consisted of (28) sub-indicators of citizenship values that were supposed to be included in the English language textbook series (We Can) for elementary education. The study sample consisted of all the English language textbooks (We Can) series for elementary education, which consisted of (6) textbooks, two for each class. The results of the study indicated that there is a
... Show MoreIraq has the distinction of being a great potential of non-renewable natural resources,
especially crude oil and natural gas. Since the discovery of crude oil at the beginning of the
twentieth century in Iraq. Although the different of investment types, it contributed to the oil
sector in the provision of financial resources to the state treasury , since that date until the
present time.
Search has been marked by division ((The foreign investment in the oil sector in Iraq after
2003)) into three sections. The first section included a brief history of the development of
Iraq's oil potential in terms of oil reserves, and oil fields, and the quantities of production and
export. The second section reviewed the investm
Abstract: The issue of rebuilding the strategiccapacity of Iraq after the occupation and the US invasion in 2003 has been oneof the most contentious issues of debate and debate. It raises a number ofpolitical, social, economic, military and security problems. We say politicalprimarily because the climate and political conditions play a large and activerole along with other factors complementary to them. The important questionthat arises here is: How can the ruling political blocs move to the stage ofreconstruction without reservations? In order to answer this question, wedivided the study into three main axes. The first deals with the concept ofpower and its types. The second axis deals with the relationship betweenstrategic capa
... Show MoreWhat happened on the Iraq war in 2003 put the problematic about what can happen from a shift in the style of individual or collective in contemporary Iraqi art similar to what is known in the history of the modern art world.
It wanted the researcher to identify this dilemma in academic study looking for an explanation of this Alastfhamat from the entrance of the definitions shows laparoscopic destination, as it determines the address (b style in painting contemporary Aeraa before and after the war) was a comparative analysis, through a choice of two Iraqi artists who have production style known sets since before the war, in order to read the transformation that took place in art before and after their tactics, and in order to off
... Show MoreIn this paper, first and second order sliding mode controllers are designed for a single link robotic arm actuated by two Pneumatic Artificial Muscles (PAMs). A new mathematical model for the arm has been developed based on the model of large scale pneumatic muscle actuator model. Uncertainty in parameters has been presented and tested for the two controllers. The simulation results of the second-order sliding mode controller proves to have a low tracking error and chattering effect as compared to the first order one. The verification has been done by using MATLAB and Simulink software.
Wastewater projects are one of the most important infrastructure projects, which require developing strategic plans to manage these projects. Most of the wastewater projects in Iraq don’t have a maintenance plan. This research aims to prepare the maintenance management plan (MMP) for wastewater projects. The objective of the research is to predict the cost and time of maintenance projects by building a model using ANN. The research sample included (15) completed projects in Wasit Governorate, where the researcher was able to obtain the data of these projects through the historical information of the Wasit Sewage Directorate. In this research artificial neural networks (ANN) technique was used to build two models (cost
... Show MoreIn this paper, an enhanced artificial potential field (EAPF) planner is introduced. This planner is proposed to rapidly find online solutions for the mobile robot path planning problems, when the underlying environment contains obstacles with unknown locations and sizes. The classical artificial potential field represents both the repulsive force due to the detected obstacle and the attractive force due to the target. These forces can be considered as the primary directional indicator for the mobile robot. However, the classical artificial potential field has many drawbacks. So, we suggest two secondary forces which are called the midpoint
... Show MoreThis paper includes an experimental study of hydrogen mass flow rate and inlet hydrogen pressure effect on the fuel cell performance. Depending on the experimental results, a model of fuel cell based on artificial neural networks is proposed. A back propagation learning rule with the log-sigmoid activation function is adopted to construct neural networks model. Experimental data resulting from 36 fuel cell tests are used as a learning data. The hydrogen mass flow rate, applied load and inlet hydrogen pressure are inputs to fuel cell model, while the current and voltage are outputs. Proposed model could successfully predict the fuel cell performance in good agreement with actual data. This work is extended to developed fuel cell feedback
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show More