This study aims to identify the degree of students of Princess Rahma University College owning e-learning skills related to MOODLE as they perceived in the of light Corona crisis. The researchers' questionnaire consisted of (37) items, distributed in three areas of e-learning skills related to the MOODLE on (147) students were chosen randomly. The results of the study showed that the degree of students 'possession of e-learning skills related to the MOODLE was significant. The results also revealed that there were statistically significant differences in the degree of students' possession of electronic learning skills related to the MOODLE due to sex in favor of females. Finally, there were no statistically significant differences in the
... Show MoreThe basic concept of diversity; where two or more inputs at the receiver are used to get uncorrelated signals. The aim of this paper is an attempt to compare some possible combinations of diversity reception and MLSE detection techniques. Various diversity combining techniques can be distinguished: Equal Gain Combining (EGC), Maximal Ratio Combining (MRC), Selection Combining and Selection Switching Combining (SS).The simulation results shows that the MRC give better performance than the other types of combining (about 1 dB compare with EGC and 2.5~3 dB compare with selection and selection switching combining).
Abstact:
Nursery is one of educational institution in the process of developing the
social concepts that it includes a quirking the knowledge and experiences that
help the kid to adjust with environment through arrangement words ,
movements and concrete things which are transferred to the kids so as to
realize these concepts .
Social concepts are numbers of words and statements with social nature
which the kids learn through the family or nursery in order to effect their
educational style of independent and helping the others .
The re searcher adopted this theory because of the little studies in the
filed of social concepts in the nursery.
The aims of the study are as following :
1- building tools for
The neutron flux in this paper, which is generated as a result of γ incineration of the radioactive fisssion products isotopes has been evaluated .It is obvious from this paper that the neutron flux value depends on the number of incineration nuclei and the nuclear cross-section of the incinerated isotopes, and the neutron flux is directly dependent on γ-ray flux. The neutron flux increases from 1010to 1017n/s.gm as the irradiation flux increases from 1016to 1020 γ/cm2.s. It is concluded that the γ-incineration technique can be used to produce a switchable neutron source of high flux.
In folk medicine there are various medicinal amalgamation possessing hepatoprotective activity. This activity is of significance because several toxins cause liver injury. Hence, many pharmaceutical companies are targeting herbal medicines for the treatment of liver abnormalities and towards evolving a safe and effective formulation with desired route of administration. In current review we have focused on the studies showing hepatoprotective effect using marine compounds and plant derived compounds. Liver disorder, a global health problem, usually include acute or chronic hepatitis, heptoses, and cirrhosis. It may be due to toxic chemicals and certain antibiotics. Uncontrolled consumption of alcohol also affects liver in an unhealthy wa
... Show MoreThe research specializes in (Usage of the visual elements in the interior designing of indoor swimming pools), the research seeks to provide a study that contributes to providing scientific and knowledge material, as a reference for researchers, students of interior design and architecture, and companies constructing indoor swimming pools.
The objective research is to detect the actual state of the interior design of the indoor swimming pools, and recognize the most important standards and techniques used in its design to provide appropriate design solutions if needed also Proposing a development proposals for the interior design of indoor swimming pools, the theoretical framework of this study, included two sections, The first one ta
Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreStandards play a vital role in documenting the values of new test results in the form of tables. They are one of the basic requirements that the standardization process aims for as a complement to standardizing test procedures, and contribute to knowing the current reality of the student. The degree of readiness and level as a result of practicing different exercises for sports activities, in addition to the possibility of adopting it for comparison with his group or similar groups, classification, prediction and selection. Developing the skill of handling the football in the educational field is an important matter for achieving distinguished performance among students. This skill requires a level of accuracy, speed and control, and
... Show MoreDeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show More