The present research aims at recognizing the difficulties and problems which hamper teachers and educators alike when using the internet for educational purposes.It discusses the benefits of the internet as a source of information or publication and as a communicative tool.Arandom sample of (30) teachers working at schools in Baghdad / Second Risafa,was selected.Three of the sample members use the internet for student project plans via internet centers, whereas 16 of them use it for chatting, emailing and research purposes.The rest of the sample have limited knowledge of the internet. The researcher used the interviewing method to gather data from the sample members.The method involved eleven questions which required their replies.The repeated distribution and the percentage were employed to analyze the collected data.Among the conclusions arrived at is that the difficulties confronted by the teachers are their computer and internet illiteracy, particularly in teaching sciences, lack of internet and computer training courses,unavailability of computers, shortage of computer and internet guides and manuals which,even when available,do not match the ongoing progress,lack of technical support,continuing power failure, high cost of computers and internet access systems, anxiety and fear of misusing the internet, which led to negative orientation in internet use,fear of accessing non-educational sites,fear of losing focus when browsing the web, in addition to the teachers’ lack of knowledge of other languages such as the English. The study makes the following recommendations.It recommends that the Ministry of Education should provide computers which are connected to the internet.Computer and internet training courses must also be held to provide teachers with the skills they need to use the internet in teaching science.There should also be curricula prepared which include the use computers and the internet in most subjects, particularly science.Material and technical support should also be provided for schools.
The global rise in temperature and the desert climatic conditions prevalent in Middle Eastern countries have exacerbated rutting distress in heavily trafficked highways. Conventional asphalt binders with a high-temperature performance grade (PG 70) have proven inadequate under such extreme conditions, necessitating the development of modified binders with enhanced high-temperature performance. While polymer modification using styrene-butadiene-styrene (SBS), an elastomeric polymer, and ethylene-vinyl acetate (EVA), a plastomeric polymer, has been widely studied, limited research provides a direct comparison of their effectiveness at both the binder and mixture levels under extremely high-temperature conditions. This study addresses this gap
... Show MoreStereo lithography (SLA) three-dimensional (3D) printing process is a type of additive manufacturing techniques that uses digital models from computer-aided design to automatically produce customized 3D objects. Around 30 years, it has been widely utilized in the manufacturing, design, engineering, industrial sectors and its applications in dentistry for manufacturing prosthodontics are very important. The stereo lithography technology is highly regarded because it can produce items with excellent precision especially when selecting the best process parameters. This review article offers a useful and scientific summary of SLA three-dimensional printing technology and its brief history. The specific type of 3D printers which is SLA type b
... Show MoreIn Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators
This paper introduces a relation between resultant and the Jacobian determinant
by generalizing Sakkalis theorem from two polynomials in two variables to the case of (n) polynomials in (n) variables. This leads us to study the results of the type: , and use this relation to attack the Jacobian problem. The last section shows our contribution to proving the conjecture.