Preferred Language
Articles
/
jperc-414
Reality and constraints of the use of computers in public schools in the governorate of Ma'an From the standpoint of teachers
...Show More Authors

 This study aims to recognize the process of using computer in    publicschools in Ma`an governorate in terms of hardware, capabilities, and teachers usage. It also aims to identify the most important obstacles those schools face from a teachers perspective.

            The study sample consists of (150) teachers from different disciplines. The researcher prepared two questionnaires related to the research pivotal, then presented to a group of arbitrators to be used in this final form. The data was analyzed statistically and the study concluded that there is a shortage in the computer services provided to teachers, and there is a weakness in their use, there are high trends in this technique. Te study shows that there is a need to train teachers on this technology, and provide all the supplies that facilitate the use of computers in teaching, and the researcher provides several recommendations that perhaps might contribute to solve the problems faced computers users in teaching.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Engineering
Improving Press Bending Production Quality through Finite Element Simulation: Integration CAD and CAE Approach
...Show More Authors

Efficient operations and output of outstanding quality distinguish superior manufacturing sectors. The manufacturing process production of bending sheet metal is a form of fabrication in the industry of manufacture in which the plate is bent using punches and dies to the angle of the work design. Product quality is influenced by plate material selection, which includes thickness, type, dimensions, and material. Because no prior research has concentrated on this methodology, this research aims to determine V-bending capacity limits utilizing the press bending method. The inquiry employed finite element analysis (FEA), along with Solidworks was the tool of choice to develop drawings of design and simulations. The ASTM E290

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Aug 18 2022
Journal Name
Sustainability
A Sustainable Cold Mix Asphalt Mixture Comprising Paper Sludge Ash and Cement Kiln Dust
...Show More Authors

Concerns about the environment, the cost of energy, and safety mean that low-energy cold-mix asphalt materials are very interesting as a potential replacement for present-day hot mix asphalt. The main disadvantage of cold bituminous emulsion mixtures is their poor early life strength, meaning they require a long time to achieve mature strength. This research work aims to study the protentional utilization of waste and by-product materials as a filler in cold emulsion mixtures with mechanical properties comparable to those of traditional hot mix asphalt. Accordingly, cold mix asphalt was prepared to utilize paper sludge ash (PSA) and cement kiln dust (CKD) as a substitution for conventional mineral filler with percentages ranging fro

... Show More
View Publication
Scopus (23)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Minerva Dental And Oral Science
Salivary interleukin-1β as a biomarker to differentiate between periodontal health, gingivitis, and periodontitis
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Clarifying Optimum Setting Temperatures and Airflow Positions for Personal Air Conditioning System on Flight
...Show More Authors

In recent years, the demand for air travel has increased and many people have traveled by plane. Most passengers, however, feel stressed due to the limited cabin space. In order to make these passengers more comfortable, a personal air-conditioning system for the entire chair is needed. This is because the human body experiences discomfort from localized heating or cooling, and thus, it is necessary to provide appropriate airflow to each part of the body. In this paper, a personal air-conditioning system, which consists of six vertically installed air-conditioning vents, will be proposed. To clarify the setting temperature of each vent, the airflow around the passenger and the operative temperature of each part of the body is investigate

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
Network Self-Fault Management Based on Multi-Intelligent Agents and Windows Management Instrumentation (WMI)
...Show More Authors

This paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
Transition Metal Complexes with Tridentate Ligand: Preparation, Spectroscopic Characterization, Thermal Analysis and Structural Studies
...Show More Authors

New series of metal ions complexes have been prepared from the new ligand 1,5- Dimethyl-4- (5-oxohexan-2- ylideneamino) -2-phenyl- 1H-pyrazol-3 (2H)-one derived from 2,5-hexandione and 4-aminophenazone. Then, its V(IV), Ni(II), Cu(II), Pd(II), Re(V) and Pt(IV) complexes prepared. The compounds have been characterized by FT-IR, UV-Vis, mass and 1H and 13C-NMR spectra, TGA curve, magnetic moment, elemental microanalyses (C.H.N.O.), chloride containing, Atomic absorption and molar conductance. Hyper Chem-8 program has been used to predict structural geometries of compounds in gas phase, the heat of formation, (binding, total and electronic energy) and dipole moment at 298 K.

View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Tue Mar 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Study on Flow Characteristics and Heat Transfer Behavior Around Different Geometrical Corrugated Extended Surfaces
...Show More Authors

Abstract

The current study presents numerical investigation of the fluid (air) flow characteristics and convection heat transfer around different corrugated surfaces geometry in the low Reynolds number region (Re<1000). The geometries are included wavy, triangle, and rectangular. The effect of different geometry parameters such as aspect ratio and number of cycles per unit length on flow field characteristics and heat transfer was estimated and compared with each other. The computerized fluid dynamics package (ANSYS 14) is used to simulate the flow field and heat transfer, solve the governing equations, and extract the results. It is found that the turbulence intensity for rectangular extended surface was larg

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 04 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced IOT Cyber-Attack Detection Using Grey Wolf Optimized Feature Selection and Adaptive SMOTE
...Show More Authors

The Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats.  This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Proposed Entropy Loss function and application to find Bayesian estimator for Exponential distribution parameter
...Show More Authors

The aim of this paper to find Bayes estimator under new loss function assemble between symmetric and asymmetric loss functions, namely, proposed entropy loss function, where this function that merge between entropy loss function and the squared Log error Loss function, which is quite asymmetric in nature. then comparison a the Bayes estimators of exponential distribution under the proposed function, whoever, loss functions ingredient for the proposed function the using a standard mean square error (MSE) and Bias quantity (Mbias), where the generation of the random data using the simulation for estimate exponential distribution parameters different sample sizes (n=10,50,100) and (N=1000), taking initial

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref