The aim of the research is to: Analyzing the content of the mathematics textbook of the 5th bio-scientific grade according to the Common Core State Standard for mathematics (CCSSM), and to identify the extent of their inclusion of these standards. To achieve this goal, the researcher built the CCSSM after reviewing the literature that dealt with those standards, and its validity was verified by presenting it to a group of referees specialized in the field of methods of teaching mathematics. Thus, the criteria in their final form consisted of six main criteria which are:(numbers and quantities, algebra, conjugations, modeling, geometry, statistics and probability) and included (47) sub-indicators, Then the researcher analyzed the content of
... Show MoreObjective: To find out the relationship between the bio-social aspect with cholelithiasis patients and
demographic characteristics in Baghdad city.
Methodology: A purposive (non-probability) sample of (100) patients, from (20-70) years old, who were
selected from patients who were admitted to hospital at preoperative stage, from Gastroenterology and
Hepatology Hospital, Baghdad Teaching Hospital, Al-Yarmook Teaching Hospital, Al-Karama Teaching
Hospital, Teaching Hospital. A descriptive study was carried out from 25th of June 2004 to the end of October
2004.
An assessment form was constructed for the purpose of the study. Test-retest reliability was employed through
computation of Pearson correlation coefficient.

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show More<p>The demand for internet applications has increased rapidly. Providing quality of service (QoS) requirements for varied internet application is a challenging task. One important factor that is significantly affected on the QoS service is the transport layer. The transport layer provides end-to-end data transmission across a network. Currently, the most common transport protocols used by internet application are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). Also, there are recent transport protocols such as DCCP (data congestion control protocol), SCTP (stream congestion transmission protocol), and TFRC (TCP-friendly rate control), which are in the standardization process of Internet Engineering Task
... Show MoreEvolutionary algorithms are better than heuristic algorithms at finding protein complexes in protein-protein interaction networks (PPINs). Many of these algorithms depend on their standard frameworks, which are based on topology. Further, many of these algorithms have been exclusively examined on networks with only reliable interaction data. The main objective of this paper is to extend the design of the canonical and topological-based evolutionary algorithms suggested in the literature to cope with noisy PPINs. The design of the evolutionary algorithm is extended based on the functional domain of the proteins rather than on the topological domain of the PPIN. The gene ontology annotation in each molecular function, biological proce
... Show More