0
يشكل الصم والبكم فئة من فئات المجتمع وهم يحتاجون الى رعاية اجتماعية خاصة تختلف بطبيعتها عن بقية الخدمات التي تقدم للمجتمع بصورة عامة من اجل ان نجعل الصم والبكم طاقة بناءة يمكن استغلالها والاستفادة منها لان اهمالهم سيكون في النتيجة عوامل هدم وتشويه اذ من المعروف ان المعوقين بصورة عامة ان لم يشغلهم عمل يصرفون فيه جهودهم ويستغلون فيه اوقاتهم يتحولون الى عبئ شديد على من حولهم وعالة ثقيلة على مجتمعهم ، لذا ف
... Show MoreRealizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost
... Show MoreThe reactive yellow azo dye (λmax = 420 nm) is widely utilized for textile coloring due to its low-cost stability and tolerance properties. Treatment of dye-containing wastewater by traditional methods is usually inadequate because of its resistance to biological and chemical degradation. From this research, the continuous reactor of an advanced oxidation method supported the use of H2O2/TiO2/UV to remove the coloration of the reactive yellow dye from the discharge. At constant best conditions obtained from the batch reactor tests pH=7, H2O2 dosage = 400 mg/l and TiO2=25mg/l , the aqueous solutions were tested in the continuous reactor at different dye concentration and d
... Show MoreThe study aimed to prepare a measure of metacognitive thinking commensurate with learning the skill, preparing educational units using the Claus Meyer model for metacognitive thinking, and learning the skill of defending the court in volleyball. To identify the effect of educational units using the model (and Claus Meyer) for metacognitive thinking and learning the skill of defending the court in volleyball. The two researchers used the experimental approach with the design of the experimental and control groups.The research community consisted of students of the second stage / College of Physical Education and Sports Sciences / University of Baghdad for the academic year 2021-2022, whose number is (385) st
... Show MoreThe aim of the current research is to verify the effect of the cognitive modeling strategy on the achievement of the chemistry course for the students of the first intermediate grade. To achieve the objective of the research, the null hypothesis was formulated via cognitive modeling strategy. The results showed that the experimental group's students performed better than the students in the control group. In the light of the results, the researchers concluded: The impact of the cognitive modeling strategy in the achievement of students of first intermediate grade in chemistry.
Statistical learning theory serves as the foundational bedrock of Machine learning (ML), which in turn represents the backbone of artificial intelligence, ushering in innovative solutions for real-world challenges. Its origins can be linked to the point where statistics and the field of computing meet, evolving into a distinct scientific discipline. Machine learning can be distinguished by its fundamental branches, encompassing supervised learning, unsupervised learning, semi-supervised learning, and reinforcement learning. Within this tapestry, supervised learning takes center stage, divided in two fundamental forms: classification and regression. Regression is tailored for continuous outcomes, while classification specializes in c
... Show MoreThere are different types of corruptions such as administrative, political, economic and financial corruption. The corruption forms also varied such as bribery, nepotism and extortion. All types and forms of corruption play significant role in the all economic variables generally and on investments in particular, and the corruption used to be an intermediate means in reducing the rate of economic growth. The corruption contributes in reducing the domestic investments via pay bribery by investors to officials’ persons for supplemental contracts and tenders which finally leads to reduction in the investment efficiency. The corruption also contributes in rise of operational costs for the investment projects. In additio
... Show MoreA new, simple and sensitive method was used forevaluation of propranolol withphosphotungstic acidto prove the efficiency, reliability and repeatability of the long distance chasing photometer (NAG-ADF-300-2) using continuous flow injection analysis. The method is based on reaction between propranolol and phosphotungstic acid in an aqueous medium to obtain a yellow precipitate. Optimum parameters was studied to increase the sensitivity for developed method. A linear range for calibration graph was 0.007-13 mmol/L for cell A and 5-15 mmol/L for cell B, and LOD 207.4792 ng/160 µL and 1.2449 µg/160 µL respectively to cell A and cell B with correlation coefficient (r) 0.9988 for cell A, 0.9996 for cell B, RSD% was lower than 1%, (n=8) for the
... Show MoreInsurance companies seeking to develop programs to promote and market their services and to increase its customer through the use of modern technical marketing and reduce its dependence on agents and take advantage of work of the banks by alliances with them and including reinforcing get the parties to competitive advantages in the financial market , the insurance services intangible service stops marketed over the insurance awareness and requires exceptional promotional efforts. &nbs
... Show MoreAbstract:- Cyberspace is a new arena for conflict between international powers, especially since the cost of cyber-conflict is less than its traditional warfare counterparts regardless of the nature of the weapons used, whether traditional or non-traditional. Cyber conflict is necessarily based on strategies to deter, attack, and defend. The aim of the cybercrime conflict is to ensure the defensive sufficiency of the state, ensuring its national security and safeguarding its supreme interests. Despite Japan-China relations characterized by convergence and cooperation in post-Cold War economic spheres, Japan continues to retain the growing Chinese influence in East Asia. These variables prompted Japan to announce a hedging strategy due to un
... Show More