This research revolves around the study of sports press coverage to the third African Youth Games that took place in Algeria from 19 to 28 July 2018. The games featured approximately 3000 athletes from 54 countries who competed in 27 sports. Five sports were qualified for the Youth Olympic Games in Argentina. The aim of this study was to analyze the content of the Algerian newspaper Ennahar El-Djadid by focusing on the discussions of various sports activities during the event. Thus, the descriptive approach and content analysis method were adopted for this research. They were used to highlight the newspaper's interest in this sports phenomenon. The chosen study samples were ten issue numbers of Ennahar El-Djadid newspaper
The images and drawings reduce the intellectual, symbolic and cognitive dimensions inside them that make them an intermediary that imposes itself on the educational method, as they have become responsive to all the needs of the student in the modern era unlike the previous periods. The artistic direction of the illustrations in the scientific books meets the educational and pedagogical needs of the learner and their frame in an illustrative educational method that contributes in developing the student's abilities to benefit from the scientific curricula in the age of scientific and cognitive development.
Here, the researcher finds that the artistic direction of the illustrations lacks the achievement of scientific and technical p
... Show MorePermeability estimation is a vital step in reservoir engineering due to its effect on reservoir's characterization, planning for perforations, and economic efficiency of the reservoirs. The core and well-logging data are the main sources of permeability measuring and calculating respectively. There are multiple methods to predict permeability such as classic, empirical, and geostatistical methods. In this research, two statistical approaches have been applied and compared for permeability prediction: Multiple Linear Regression and Random Forest, given the (M) reservoir interval in the (BH) Oil Field in the northern part of Iraq. The dataset was separated into two subsets: Training and Testing in order to cross-validate the accuracy
... Show MoreTheoretical and experimental investigations of free convection through a cubic cavity with sinusoidal heat flux at bottom wall, the top wall is exposed to an outside ambient while the other walls are adiabatic saturated in porous medium had been approved in the present work. The range of Rayleigh number was and Darcy number values were . The theoretical part involved a numerical solution while the experimental part included a set of tests carried out to study the free convection heat transfer in a porous media (glass beads) for sinusoidal heat flux boundary condition. The investigation enclosed values of Rayleigh number (5845.6, 8801, 9456, 15034, 19188 and 22148) and angles of inclinations (0, 15, 30, 45 and 60 degree). The numerical an
... Show MoreAs cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreBackground: Rehabilitation of the carious tooth to establish tooth structure integrity required cavity design that show a benign stress distribution. The aim of this study was to investigate the influence of the cavity position on the stress values in the reamining tooth structure restored with amalgam or resin composite. Materials and methods: Seven 2-D models of maxillary first premolar include class I cavity design was prepared, one sound tooth (A) 3 composite (B1, B2, and B3) and 3 amalgam (C1, C2, and C3). In design (BI and C1) the cavity position is in the mid distance between bacc-lingual cusp tip, design (B2 and C2) and (B3 and C3) shifted toward the buccal cusp and the lingual cusp for 0.5 mm respectively. One hundred N vertical
... Show MoreThis work aims to show the nature of the relationship between management by walking around (the independent variable) and strategic renewal (the dependent variable), as well as it shows the effect of the independent variable on the dependent variable. Questionnaire items were considered the main tool for data collection by three basic aspects. The first involved the personal data of the respondents, while the second included items related to management by walking in five dimensions, and the third is strategic renewal items by addressing four dimensions. The tourism sector, while the community has six Excellent grade hotels was taken into account in this wor
... Show More