The work in this paper involves the planning, design and implementation of a mobile learning system called Nahrain Mobile Learning System (NMLS). This system provides complete teaching resources, which can be accessed by the students, instructors and administrators through the mobile phones. It presents a viable alternative to Electronic learning. It focuses on the mobility and flexibility of the learning practice, and emphasizes the interaction between the learner and learning content. System users are categorized into three categories: administrators, instructors and students. Different learning activities can be carried out throughout the system, offering necessary communication tools to allow the users to communicate with each other through forums, SMS and e-mails. NMLS platform is based on 3G mobile phone technology and adopted WAP as a solution for the system platform. The NMLS framework is based on three layers, which are presentation layer, business logic layer and data layer.
Objective(s): The study aims to evaluate the information of the elderly about personal hygiene , and to find out the relationship between residents of geriatric-care homes knowledge and their demographic characteristics .
Methodology: A quasi-experimental design study is conducted at geriatric home in Al Cyelakh Geriatric Care Home. The study was started at between November 20, 2021, and March 1, 2023. randomly sample of (30) elderly in geriatric home were studied . Data were collected throughout the utilization of the adopted questionnaire and interview technique. The questionnaire was consists of (40) items related to concerned personal hygiene geriatrics persons, t
... Show MoreAdministrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has bee
The paper presents an overview of theoretical aspects of small radio telescope antenna parameters. The basic parameters include antenna beamwidth, antenna gain, aperture efficiency, and antenna temperature. These parameters should be carefully studied since they have vital effects on astronomical radio observations. The simulations of antenna parameters were carried out to assess the capability and the efficiency of small radio telescopes to observe a point source at a specific frequency. Two-dimensional numerical simulations of a uniform circular aperture antenna are implemented at different radii. The small diameter values are chosen to be varied between (1-10) m. This study focuses on a small radio telescope with a diameter of 3 m sin
... Show MoreIn this research, the influence of the orientation and distance factors on the lowest usable frequency (LUF) parameter has been studied theoretically. The calculations of the (LUF) parameter have been made using the (VOACAP) international communication model for the connection links between the capital Baghdad and many other locations that distributed on different distances and directions over the Middle East region. The results shown in this study indicate there is a slight affection of the link direction (orientation) on the LUF parameter, while the influence of the distance factor is more significant on the values of the LUF parameter. The day/night effect appears for the long distance HF links (i.e. more than a 500 Km)
The research aims at the scholars’attention to the importance and role of Arab Muslim women through books and historical studies that historians and scholars have taken up like Ibn Al-Jawzi (597 AH) and his book Safwat Al-Safwa, where he presented the conduct of worship and their words and deeds, and explained to women worshipers other aspects of their lives, such as the scientific aspect Crafts and works as well as their prominent role in preaching and religious guidance, and the impact of this on their morals and qualities. This study showed the strength of the personality of women and their high interest in worship. The importance of the study lies in knowledge.The research followed the role of Muslim women to carry t
... Show MoreThis study aimed to analyze and measure the relationship between oil revenues and financial sustainability in Iraq, the study used the stylistic approach inductive and deductive approach. Accompanied by the use of quantitative and analytical style, which was based on two variables oil revenues and net general budget on annual data covered the period (1990-2013). Among the most important findings of the study contain the time-series variables study on the root of the unit and is not stable in the general level, and become stable after the use of mathematical processors to gain access to a stable by taking the first difference of natural Ogartm of the series. The way (Johnson) to a long-term relationship between oil revenues and ne
... Show MoreActing on the Holy Qur’an by contemplating its meanings, stopping at its commands and prohibitions, and everything in it that guides us to truth and mercy. The Holy Qur’an includes it for various purposes in one verse, and there is no doubt that this is part of the perfection of this great book, and one of the sciences of the fundamentalists is the indication of the context, and it is a great science of high rank, and it is one of the most important things that lead to the correct understanding of the miraculous and decisive book of God Almighty, and one of the best meanings of the Qur’an It was not from the context of the verses, and from here it can be said that the indication of the context is one of the origins of deriving lega
... Show MoreAbstract
This current study aims to know the characteristics of the doctors’ impact on success “doctors who work as managers specifically”.
The sample contains from (60) doctors work in the three hospitals in Baghdad, The data collected with questionnaire, the main personnel characteristics the desire to work as hospitals managers. The study contains three chapters. The first is to the theoretical, background. The second is methodology and the third is the data analysis and also explains the results and conclusions and the recommendations. Specification and characteristics manager in general hospitals
A survey Study in Al-Rusafa Health Directorate Hospitals
... Show MoreIn this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show More