The need to constantly and consistently improve the quality and quantity of the educational system is essential. E-learning has emerged from the rapid cycle of change and the expansion of new technologies. Advances in information technology have increased network bandwidth, data access speed, and reduced data storage costs. In recent years, the implementation of cloud computing in educational settings has garnered the interest of major companies, leading to substantial investments in this area. Cloud computing improves engineering education by providing an environment that can be accessed from anywhere and allowing access to educational resources on demand. Cloud computing is a term used to describe the provision of hosting services on the Internet. It is predicted to be the next generation of information technology architecture and offers great potential to enhance productivity and reduce costs. Cloud service providers offer their processing and memory resources to users. By paying for the use of these resources, users can access them for their calculations and processing anytime and anywhere. Cloud computing provides the ability to increase productivity, save information technology resources, and enhance computing power, converting processing power into a tool with constant access capabilities. The use of cloud computing in a system that supports remote education has its own set of characteristics and requires a unique strategy. Students can access a wide variety of instructional engineering materials at any time and from any location, thanks to cloud computing. Additionally, they can share their materials with other community members. The use of cloud computing in e-learning offers several advantages, such as unlimited computing resources, high scalability, and reduced costs associated with e-learning. An improvement in the quality of teaching and learning is achieved through the use of flexible cloud computing, which offers a variety of resources for educators and students. In light of this, the current research presents cloud computing technology as a suitable and superior option for e-learning systems.
One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,
... Show MoreRecord, verify, and showcase your peer review contributions in a format you can include in job and funding applications (without breaking reviewer anonymity).
Seventy four Iraqi breast cancer paraffin blocks were collected from patients were attended to center health laboratory, histopathology department, Bagdad, Iraq. The patients information’s which included: name, age, and the pathological stage, grade, tumor size were obtained from the clinical records of the patients also relation with sex hormones was recorded. The cases which has been taken included invasive ductal and invasive lobular carcinoma type Women age were ranged from 24-80 years peak age frequency of tumor occurred in the category of more than 40 years old. Immunohistochemical expression of her-2/neu was from total 74 cases of infiltrative ductal carcinoma cases, 27(36.49%)were positive for Her-2/neu expression, 47(63.51%) were
... Show MoreThe study aimed to determine the effect of the flipped learning model in improving the acquisition of the overhand serve skill in volleyball among second-year students at the College of Physical Education and Sport Sciences, University of Baghdad, for the academic year 2024/2025. The study used an experimental design with a control group and pre-post testing, on a purposive sample consisting of 12 students. The model relied on watching short videos before class via the SGS application, and practical application in class at a rate of three sessions per week. The results showed a significant improvement in performance, as the calculated value (t = 5.356) exceeded the tabulated value (2.042) at a significance level of 0.05. The percentage of s
... Show MoreThe problem of the paper focused on the role of the learning organization in the crisis management strategy, and the extent of the actual interest in both the learning organization and the crisis management and aimed at diagnosing and analyzing that and surrounding questions. The Statistical Package for the Social Sciences (SPSS) program was used to calculate the results and the correlation coefficient between the two main variables. The methodology was descriptive and analytical. The case study was followed by a questionnaire that was distributed to a sample of 31 teachers. The paper adopted a seven-dimensional model of systemic thinking that encourages questioning, empowerment, provision of advanced technologies, and strategic lea
... Show MoreThe current study aims to examine the level of problems faced by university students in distance learning, in addition to identify the differences in these problems in terms of the availability of internet services, gender, college, GPA, interactions, academic cohort, and family economic status. The study sample consisted of (3172) students (57.3% females). The researchers developed a questionnaire with (32) items to measure distance learning problems in four areas: Psychological (9 items), academic (10 items), technological (7 items), and study environment (6 items). The responses are scored on a (5) point Likert Scale ranging from 1 (strongly disagree) to 5 (strongly agree). Means, standard deviations, and Multivariate Analysis of Vari
... Show MoreMost recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
IFRS 17 aims to provide a unified basis for accounting for all types of insurance contracts, including reinsurance contracts, in a manner that benefits both investors and insurance companies and enhances the ability of the financial statements of insurance companies for comparison between companies listed in financial markets around the world. According to this standard, insurance contracts are accounted for on the basis of the Asset-Liability Approach and the use of fair values that the standard requires updating regularly in order to provide more useful information to the users of financial statements, as a result of the failure of reporting requirements for insurance contr
... Show MoreThe research aimed to determine the role of the agricultural extension in educating farmers about the legislation on the protection of the rural environment from pollution with chemical pesticides working in the Department of Agricultural Extension and Training and the Department of Agricultural Extension in the directorates of agriculture of Najaf and Qadisiyah, and to determine the role of the agricultural extension in the axis of farmers' use of the correct methods to protect the rural environment from pollution with chemical pesticides and the axis of the reasons that lead farmers to pollute the rural environment with chemical pesticides, and to achieve the objectives of this research prepared A questionnaire in the light of rev
... Show More