The need to constantly and consistently improve the quality and quantity of the educational system is essential. E-learning has emerged from the rapid cycle of change and the expansion of new technologies. Advances in information technology have increased network bandwidth, data access speed, and reduced data storage costs. In recent years, the implementation of cloud computing in educational settings has garnered the interest of major companies, leading to substantial investments in this area. Cloud computing improves engineering education by providing an environment that can be accessed from anywhere and allowing access to educational resources on demand. Cloud computing is a term used to describe the provision of hosting services on the Internet. It is predicted to be the next generation of information technology architecture and offers great potential to enhance productivity and reduce costs. Cloud service providers offer their processing and memory resources to users. By paying for the use of these resources, users can access them for their calculations and processing anytime and anywhere. Cloud computing provides the ability to increase productivity, save information technology resources, and enhance computing power, converting processing power into a tool with constant access capabilities. The use of cloud computing in a system that supports remote education has its own set of characteristics and requires a unique strategy. Students can access a wide variety of instructional engineering materials at any time and from any location, thanks to cloud computing. Additionally, they can share their materials with other community members. The use of cloud computing in e-learning offers several advantages, such as unlimited computing resources, high scalability, and reduced costs associated with e-learning. An improvement in the quality of teaching and learning is achieved through the use of flexible cloud computing, which offers a variety of resources for educators and students. In light of this, the current research presents cloud computing technology as a suitable and superior option for e-learning systems.
Future generations of wireless networks are expected to heavily rely on unmanned aerial vehicles (UAVs). UAV networks have extraordinary features like high mobility, frequent topology change, tolerance to link failure, and extending the coverage area by adding external UAVs. UAV network provides several advantages for civilian, commercial, search and rescue applications. A realistic mobility model must be used to assess the dependability and effectiveness of UAV protocols and algorithms. In this research paper, the performance of the Gauss Markov (GM) and Random Waypoint (RWP) mobility models in multi-UAV networks for a search and rescue scenario is analyzed and evaluated. Additionally, the two mobility models GM and RWP are descr
... Show MoreBackground: Friedreich ataxia (FRDA) is the most common form of inherited ataxia, comprising one-half of all hereditary ataxias with a carrier rate between 1 in 60 to 1 in 90 and with a disease prevalence of 1 per 29,000. It can occur in two forms the classic form or in association with a vitamin E dependent ataxia. The precise role of Vitamin E in the nervous system is unknown; An Oxidative attack is suspected to play a role in Ataxia with Vitamin E deficiency, as well as in Friedreich ataxia. Vitamin E is the major free-radical-trapping antioxidant.
Objective: Theobjectives of the study is to asses vitamin E level in patients with Friedreichs ataxia phenotype in Iraqi patients.
... Show More
In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreThis article examines the usage features of the phraseological units in Russian political discourse and the peculiarities of the phraseological units’ usage by politicians in their speeches. The main focus is on the expressive and pragmatic functions of using phraseological units in political texts due to their evaluative and expressive nature. The present article also examines the structural and stylistic changes of the phraseological units in political discourse. Moreover, the work provides examples from the speeches of the Minister of Foreign Affairs of the Russian Federation S.V. Lavrov. As a result, the author comes to the conclusion that phraseological units make it possible to establish a contact be
... Show MoreSince the beginning of the twentieth century, the art of composition has witnessed major transformations that accompanied the transformations that occurred in the cognitive field. The plastic artists rejected the prevailing artistic line, and sought to create a new artistic format that accommodates the new social and cultural problems. So was the announcement of the era of modernity in the late nineteenth century, with the birth of the impressionism movement that gave a place to challenge all that is familiar. . And he drew the attention of the researcher, and for that he chose the research title (Characteristics of Modernity in the Works of Saleh Al-Jumayyi (Analytical Study)) The researcher divided the research as follows:
Methodolo
In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show MoreSentiment analysis refers to the task of identifying polarity of positive and negative for particular text that yield an opinion. Arabic language has been expanded dramatically in the last decade especially with the emergence of social websites (e.g. Twitter, Facebook, etc.). Several studies addressed sentiment analysis for Arabic language using various techniques. The most efficient techniques according to the literature were the machine learning due to their capabilities to build a training model. Yet, there is still issues facing the Arabic sentiment analysis using machine learning techniques. Such issues are related to employing robust features that have the ability to discrimina
... Show MoreIn the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MoreLayer by layer development two features of pulsed laser deposition PLD, with a high kinetic energy and sharp instantaneous deposition rating. Layered films of polymer/metal/ceramic nanocomposites consisting of polystyrene PS(as substrate) , tin Sn and cadmium oxide CdO were deposited by PLD. Structure for layered samples were measured by XRD X ray diffraction, there were appearance of peaks which reflected to formation of new compounds result of reaction between layers. Particles size was calculated using two methods and it give nanoscale. Microstrain was also calculated and exhibited high value (0.01) for sample p/m.