The Department of Art Education in the College of Fine Arts is one of the educational institutions that aims to prepare teachers specialized in teaching art education in secondary schools and other educational institutions, which forces those in charge of preparing the curricula for this section and developing it, taking into account the rapid scientific and technological development. And the subject (Music Appreciation) is one of the subjects taught for the third grades in Art Education departments, and through the exploratory study carried out by the researcher it became clear to him that the Faculties of Fine Arts agreed to define their educational objectives and outputs in the subject (Music Appreciation) in Art Education departments, but they did not agree In preparing a unified curriculum vocabulary for this subject, which prompted the researcher to prepare a proposed curriculum for the subject of musical appreciation for the departments of art education in the Faculties of Fine Arts, using the curriculum vocabulary taught in these departments. The first chapter included the objective of the research: Preparing a proposed curriculum for the subject of musical appreciation in the departments of art education in the Faculties of Fine Arts in Iraqi universities, in light of the objectives set for each department and the vocabulary taught in it. The second chapter included the themes: curriculum, objectives, and musical appreciation. The fourth chapter included: the procedures followed by the researcher in preparing the proposed curriculum and building the research tool. As for the fourth chapter, it includes the results of the research that have been achieved by preparing the proposed curriculum for the subject (musical appreciation) in the departments of art education - Faculties of Fine Arts in Iraq, through the procedures carried out by the researcher in the third semester, and in light of the results the researcher concluded the following:
1. The curriculum for the subject (Musical Appreciation), which is taught in Art Education departments, was prepared without reference to experts who are specialized in the educational, artistic, and applied fields in the field of musical arts.
2. The need to improve the curriculum of the subject (musical appreciation) in order to raise the level of its objectives and vocabulary to the level at which it meets the valid standards of the applied curricula, and thus conforms to the developments in this field.
As for the recommendations, they were: The necessity of reviewing well-known world classifications, in the cognitive, emotional and skillful aspects, in order to build an integrated approach to the subject of musical appreciation. Then the proposals
In this paper, a robust adaptive sliding mode controller is designed for a mobile platform trajectory tracking. The mobile platform is an example of a nonholonomic mechanical system. The presence of holonomic constraints reduces the number of degree of freedom that represents the system model, while the nonholonomic constraints reduce the differentiable degree of freedom. The mathematical model was derived here for the mobile platform, considering the existence of one holonomic and two nonholonomic constraints imposed on system dynamics. The partial feedback linearization method was used to get the input-output relation, where the output is the error functions between the position of a certain point on the platform
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show MoreA novel demountable shear connector is proposed to link a concrete slab to steel sections in a way that resulting steel-concrete composite floor is demountable, i.e. it can be easily dismantled at the end of its service life. The proposed connectors consist of two parts: the first part is a hollow steel tube with internal threads at its lower end. The second part is a compatible partially threaded bolted stud. After linking the stud to the steel section, the hollow steel tube can be fastened over the threaded stud, which create a complete demountable shear connector. The connector is suitable for use in both composite bridges and buildings, and using cast in-situ slabs, precast solid slabs, or hollow-core precast slabs. A series of push-off
... Show MoreImage classification is the process of finding common features in images from various classes and applying them to categorize and label them. The main problem of the image classification process is the abundance of images, the high complexity of the data, and the shortage of labeled data, presenting the key obstacles in image classification. The cornerstone of image classification is evaluating the convolutional features retrieved from deep learning models and training them with machine learning classifiers. This study proposes a new approach of “hybrid learning” by combining deep learning with machine learning for image classification based on convolutional feature extraction using the VGG-16 deep learning model and seven class
... Show MoreThis paper proposes a new structure for a Fractional Order Sliding Mode Controller (FOSMC) to control a Twin Rotor Aerodynamic System (TRAS). The new structure is composed by defining two 3-dimensional sliding mode surfaces for the TRAS model and introducing fractional order derivative integral in the state variables as well as in the control action. The parameters of the controller are determined so as to minimize the Integral of Time multiplied by Absolute Error (ITAE) performance index. Through comparison, this controller outperforms its integer counterpart in many specifications, such as reducing the delay time, rise time, percentage overshoot, settling time, time to reach the sliding surface, and amplitude of chattering in control inpu
... Show MoreLowering the emission, fuel economy and torque management are the essential
requirements in the recent development in the automobile industry. The main engine control
input that satisfies the above requirements is the throttling angle which adjusts the air mass
flow rate to the engine port. Due to the uncertainty and the presence of the nonlinear
components in its dynamical model, the sliding mode control theory is utilized in this work
for the throttle valve angle control system to design a robust controller for this system in the
presence of a nonlinear spring and Coulomb friction. A continuous sliding mode control law
which consists of a saturation function, instead of a signum function, and the integral of
ano
The Cu(II) was found using a quick and uncomplicated procedure that involved reacting it with a freshly synthesized ligand to create an orange complex that had an absorbance peak of 481.5 nm in an acidic solution. The best conditions for the formation of the complex were studied from the concentration of the ligand, medium, the eff ect of the addition sequence, the eff ect of temperature, and the time of complex formation. The results obtained are scatter plot extending from 0.1–9 ppm and a linear range from 0.1–7 ppm. Relative standard deviation (RSD%) for n = 8 is less than 0.5, recovery % (R%) within acceptable values, correlation coeffi cient (r) equal 0.9986, coeffi cient of determination (r2) equal to 0.9973, and percentage capita
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MorePolyacrylonitrile nanofiber (PANFS), a well-known polymers, has been extensively employed in the manufacturing of carbon nanofibers (CNFS), which have recently gained substantial attention due to their excellent features, such as spinnability, environmental friendliness, and commercial feasibility. Because of their high carbon yield and versatility in tailoring the final CNFS structure, In addition to the simple formation of ladder structures through nitrile polymerization to yield stable products, CNFS and PAN have been the focus of extensive research as potential production precursors. For instance, the development of biomedical and high-performance composites has now become achievable. PAN homopolymer or PAN-based precursor copolymer can
... Show MoreThe challenge to incorporate usability evaluation values and practices into agile development process is not only persisting but also systemic. Notable contributions of researchers have attempted to isolate and close the gaps between both fields, with the aim of developing usable software. Due to the current absence of a reference model that specifies where and how usability activities need to be considered in the agile development process. This paper proposes a model for identifying appropriate usability evaluation methods alongside the agile development process. By using this model, the development team can apply usability evaluations at the right time at the right place to get the necessary feedback from the end-user. Verificatio
... Show More