The purpose of this study is to diagnose factors that effect Thi-Qar behavioral intention to use internet. A sample of (127) internet users of university staff was taken in the study and were analyzed by using path analyze . The study concluded that there is a set of affecting correlation. It was founded that exogenous variables (gender, income, perceived fun, perceived usefulness, Image, and ease of use) has significant effect on endogenous (behavioral intention) . The result of analysis indicated that image hopeful gained users comes first, ease of use secondly, perceived fan and perceived usefulness on (dependent variables (daily internet usage and diversity of internet usage. Implication of these result are discussed . the study ended with recommendation stress the importance of such factors and the need of exploiting them to enhance internet use.
مشكلة البحث The Problem of the Research
يعّد التحصيل الدراسي للطلبة عموما من أهم أركان النشاط العقلي في المجال التربوي، فلا تكاد تخلو منه أيه مدرسة، أبتداءً من المدارس الابتدائية وقد تسبقها رياض الأطفال، إلى المدرسة الإعدادية والجامعية ، وقد تمتد إلى مراحل متقدمة في العمر، فكان الطالب وما يزال هو محور العملية ال
... Show MoreInfographics have the capability to organize and display information in a way that is easy for viewers to retrieve and make observations. While infographics have been successful in various fields, their potential benefits in composition writing have not been explored. The primary objective of this study is to investigate the perspectives of Iraqi EFL students who used infographics as an educational technology tool in composition writing, and to identify how gender influences students’ performance when using infographics in EFL writing classes. The significance of this study lies in its integration of infographics as an educational technology tool for teaching writing, aligning with the current trend of technology integration in ed
... Show Moreتنفذ أجهزة اإلحصاء الدولية ومنها الجهاز المركزي لإلحصاء في العراقإحدى أجهزة وزارة التخطيط، تقوم بإجراء مسوح سنوية ودورية لإنتاج مؤشرات تقييم وتقويم أنشطة القطاعات الاقتصادية المختلفة. يتيح هذا الكم الهائل من البيانات بشكل سلسل زمني لهذه الأجهزة إنتاج مؤشرات جديدة، بما في ذلك القيم التنبؤية لمؤشرات رئيسية تستخدم في إعداد الخطط طويلة وقصيرة المدى. في عام 2015، قامت مديرية الإحصاء الزراعي في الجهاز المركزي للإ
... Show Moreمن خلال ملاحظة الباحثتين الميدانية لمستوى الأداء الفني لمنتخب ناشئات القطر بالجمناستك لمهارة قفزة اليدين الأمامية على جهاز منصة القفز الحديثة لاحظن وجود مشكلة تكمن في ضعف هذا الأداء والذي يؤثر على بعض المتغيرات البيوكينماتيكية لهذه المهارة مما يؤدي إلى عدم أداء المهارة بالشكل الصحيح ، وتعزو الباحثتان ذلك الضعف إلى قلة الدفع بالرجلين والذراعين . لذا ارتأت الباحثتان إجراء هذا البحث الذي يهدف إلى تنمية القوة
... Show MoreThe inhibitive action of polyvinyl alcohol –sodium nitrite (PVASN) composite on the corrosion of mild steel in simulated cooling water (SCW) has been investigated by weight loss and potentiodynamic polarization. The effect of composite concentration (PVA/SN) , pH, and exposure time on corrosion rate of mild steel were verified using 2 levels factorial design and surface response analysis through weight loss approach, while the electrochemical measurements were used to study the behavior of mild steel in (SCW) with pH between 6 and 8 and in absence and presence of (PVA) in solution containing different concentration of NaNO2. It was verified that all three main variables studied were statistically significant while their interaction is
... Show MoreTransient mixed convection heat transfer in a confined porous medium heated at periodic sinusoidal heat flux is investigated numerically in the present paper. The Poisson-type pressure equation, resulted from the substituting of the momentum Darcy equation in the continuity equation, was discretized by using finite volume technique. The energy equation was solved by a fully implicit control volume-based finite difference formulation for the diffusion terms with the use of the quadratic upstream interpolation for convective kinetics scheme to discretize the convective terms and the temperature values at the control volume faces. The numerical study covers a range of the hydrostatic pressure sinusoidal amplitude range and
... Show MoreTransient mixed convection heat transfer in a confined porous medium heated at periodic sinusoidal heat flux is investigated numerically in the present paper. The Poisson-type pressure equation, resulted from the substituting of the momentum Darcy equation in the continuity equation, was discretized by using finite volume technique. The energy equation was solved by a fully implicit control volume-based finite difference formulation for the diffusion terms with the use of the quadratic upstream interpolation for convective kinetics scheme to discretize the convective terms and the temperature values at the control volume faces. The numerical study covers a range of the hydrostatic pressure head , , , , and ), sinusoidal amplitude range of
... Show MoreThe limitations of wireless sensor nodes are power, computational capabilities, and memory. This paper suggests a method to reduce the power consumption by a sensor node. This work is based on the analogy of the routing problem to distribute an electrical field in a physical media with a given density of charges. From this analogy a set of partial differential equations (Poisson's equation) is obtained. A finite difference method is utilized to solve this set numerically. Then a parallel implementation is presented. The parallel implementation is based on domain decomposition, where the original calculation domain is decomposed into several blocks, each of which given to a processing element. All nodes then execute computations in parall
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
A new human-based heuristic optimization method, named the Snooker-Based Optimization Algorithm (SBOA), is introduced in this study. The inspiration for this method is drawn from the traits of sales elites—those qualities every salesperson aspires to possess. Typically, salespersons strive to enhance their skills through autonomous learning or by seeking guidance from others. Furthermore, they engage in regular communication with customers to gain approval for their products or services. Building upon this concept, SBOA aims to find the optimal solution within a given search space, traversing all positions to obtain all possible values. To assesses the feasibility and effectiveness of SBOA in comparison to other algorithms, we conducte
... Show More