The need to constantly and consistently improve the quality and quantity of the educational system is essential. E-learning has emerged from the rapid cycle of change and the expansion of new technologies. Advances in information technology have increased network bandwidth, data access speed, and reduced data storage costs. In recent years, the implementation of cloud computing in educational settings has garnered the interest of major companies, leading to substantial investments in this area. Cloud computing improves engineering education by providing an environment that can be accessed from anywhere and allowing access to educational resources on demand. Cloud computing is a term used to describe the provision of hosting services on the Internet. It is predicted to be the next generation of information technology architecture and offers great potential to enhance productivity and reduce costs. Cloud service providers offer their processing and memory resources to users. By paying for the use of these resources, users can access them for their calculations and processing anytime and anywhere. Cloud computing provides the ability to increase productivity, save information technology resources, and enhance computing power, converting processing power into a tool with constant access capabilities. The use of cloud computing in a system that supports remote education has its own set of characteristics and requires a unique strategy. Students can access a wide variety of instructional engineering materials at any time and from any location, thanks to cloud computing. Additionally, they can share their materials with other community members. The use of cloud computing in e-learning offers several advantages, such as unlimited computing resources, high scalability, and reduced costs associated with e-learning. An improvement in the quality of teaching and learning is achieved through the use of flexible cloud computing, which offers a variety of resources for educators and students. In light of this, the current research presents cloud computing technology as a suitable and superior option for e-learning systems.
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreHydrochloric acid (HCl) is a substance that is frequently utilized in industrial operations for important tasks such as chemical cleaning and pickling metallic surfaces.Therefore, the corrosion inhibition ability of three newly synthesized quinazoline derivatives namely, 3-allyl-2-(propylthio) quinazolin-4(3H)-one) (APQ), (3-allyl-2-(allylthio) quinazolin-4(3H)-one) (AAQ), (3-allyl- 2-( Prop -2-yn -1-ylthio) Quinazolin - 4 (3H) - one) (AYQ) were theoretically determined and these compounds were characterized using Fourier Transform Infra-Red (FTIR) and 1H and 13C Nuclear Magnetic Resonance (NMR) spectroscopic. A series of quantum chemical properties of these derivatives: EHOMO, ELUMO, energy gap (ΔE),dipole moment (μ), hardness (η), soft
... Show MoreThe selection of proper field survey parameters of electrical resistivity can significantly provide efficient results within a reasonable time and cost. Four electrode arrays of 2D Electric Resistivity Imaging (ERI) surveys were applied to characterize and detect subsurface archaeological bodies and to determine the appropriate array type that should be applied in the field survey. This research is to identify the subsurface features of the Borsippa archaeological site, Babylon Governorate, Middle Iraq. Synthetic modeling studies were conducted to determine the proper array and parameters for imaging the shallow subsurface features or targets. The efficiency of many array types has been tested for the detection the buried archaeolog
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show Morenew, simple and fast solid-phase extraction method for separation and preconcentration of trace theophylline in aqueous solutions was developed using magnetite nanoparticles (MIONPs) coated with aluminium oxide (AMIONPs) and modified with palmitate (P) as an extractor (P@AMIONPs). It has shown that the developed method has a fast absorbent rate of the theophylline at room temperature. The parameters that affect the absorbent of theophylline in the aqueous solutions have been investigated such as the amount of magnetite nanoparticle, pH, standing time and the volume, concentration of desorption solution. The linear range, limit of quantification (LOQ) and limit of detection (LOD) for the determination of theophylline were 0.05-2.450 μg mL-
... Show MoreThe research aims to identify the impact of using the electronic participatory learning strategy according to internet programs in learning some basic basketball skills for middle first graders according to the curricular course, and the sample of research was selected in the deliberate way of students The first stage of intermediate school.As for the problem of research, the researchers said that there is a weakness in the levels of school students in terms of teaching basketball skills, which prompted the researchers to create appropriate solutions by using a participatory learning strategy.The researchers imposed statistically significant differences between pre and post-test tests, in favor of the post tests individually and in favor of
... Show MoreThe adopted method in the teaching of history is conservation and indoctrination in all grades, and this will lead to a lack of students interact with teachers in the course of the lesson, and poor use of teachers to questions that raise students' thinking during the lesson, which leads to a lack of interest in the topic of the lesson and wasting opportunities contribution making it the teacher at the center of the educational process, and to provide arrogating the researcher to contribute to teaching style with the belief that the use of this method of teaching could lead to overcome the difficulties and problems faced by the teaching material.
And there are educational complexes integrated approac
... Show MoreThe study aims at investigating the effectiveness of the Virtual Library Technology, in developing the achievement of the English Language Skills in the Center of Development and Continuous Education, in comparison with the individual learning via personal computer to investigate the students' attitude towards the use of both approaches. The population of the study includes the participants in the English Language course arranged in the Center. The sample includes 60 students who were randomly chosen from the whole population (participants in English Courses for the year 2009-2010). The sample is randomly chosen and divided into two experimental groups. The first group has learned through classroom technology; while the other group has l
... Show More