Nowadays, due to our everyday stress and current stressful lifestyle, the loss of items appears a frequent issue and may be very inconvenient. In this regard, until the IoT becomes part of everyday life, we can use the software as an efficient tool to assist a person's searching, verifying, and finding lost belongings. This paper presents an Android-based application that we proposed and implemented to help users find lost items. Utilizing this software will enable the subscriber to record his request to the relevant authority. In addition, a special section offers to insert a contact telephone number or email to communicate between the person who found the item and the person who lost it. During testing, among other services, the platform showed its capabilities to register and log users, releasing a lot of information of lost items and automatically forwarding lost-and-found notifications. The paper can be useful for those who deal with the application of information technology.
The cinematographer mediates through the means of cinema and television a set of elements complementing each other in the light of developments in various sciences, culture and arts for the purpose of conveying the meaning to the recipient and achieve aesthetic taste. Despite the diversity of cinematographic media with its multiple forms, The researcher started from the principle of definition and knowledge of a technical phenomenon that emerged in the cinematographic medium through the treatment of dramatic events through the solutions of the exit line depends on the narrative of events in one place contributes to attract Mam spectator since this interesting phenomenon in the mediator, there .van question arises the adoption of that vis
... Show MoreResearch objective to identify the degree of environmental sustainability values of the student-teacher in the College of Education for Pure Sciences. In this research the methodology of relational descriptive research was adopted, and the research sample consisted of (116) students from the College of Education for Pure Sciences / Ibn Al-Haytham / University of Baghdad From the Department of Chemistry (fourth stage), that is, 54% of the research community were randomly selected. The research tool was prepared, represented by a measure of environmental sustainability values of (20) items, the results of the research showed: The poor degree of environmental sustainability values. The Statistical Portfolio of Social Sciences (SPSS) was adopte
... Show MoreThe Russian foreign policy of the post-cold-war era faced dilemmas in the light of the international and regional realities of the disintegration of the Soviet Union and the formation of a new unipolar international order led by the United States of America. Thus, Russian foreign policy-making was divided over the nature of the foreign policy to be followed. The achievement of the Russian goals, especially as the objectives of Russian foreign policy have been set within the framework of trying to regain the status and leading role, as well as the establishment of some fundamental changes to be consistent with the new international situation of the post-one The Russian Federation has adopted in the sphere of its foreign policy to the vari
... Show MoreIn this paper, Touchard polynomials (TPs) are presented for solving Linear Volterra integral equations of the second kind (LVIEs-2k) and the first kind (LVIEs-1k) besides, the singular kernel type of this equation. Illustrative examples show the efficiency of the presented method, and the approximate numerical (AN) solutions are compared with one another method in some examples. All calculations and graphs are performed by program MATLAB2018b.
Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show MoreRecently, Knowledge Management Systems (KMS) consider one of the major fields of study in educational institutions, caused by the necessity to identify their knowledge value and success. Hence, based on the updated DeLone and McLean’s Information Systems Success Model (DMISSM), this study set out to assess the success of the Perceived Usefulness of Knowledge Management Systems (PUKMS) in Iraqi universities. To achieve this objective, the quantitative method is selected as the research design. In total, 421 university administration staff members from 13 Iraqi private universities were conducted. This study highlights a number of significant results depending on structural equation modeling which confirms that system, information, and s
... Show MoreIn recent years, the number of applications utilizing mobile wireless sensor networks (WSNs) has increased, with the intent of localization for the purposes of monitoring and obtaining data from hazardous areas. Location of the event is very critical in WSN, as sensing data is almost meaningless without the location information. In this paper, two Monte Carlo based localization schemes termed MCL and MSL* are studied. MCL obtains its location through anchor nodes whereas MSL* uses both anchor nodes and normal nodes. The use of normal nodes would increase accuracy and reduce dependency on anchor nodes, but increases communication costs. For this reason, we introduce a new approach called low communication cost schemes to reduce communication
... Show MoreCorpus linguistics is a methodology in studying language through corpus-based research. It differs from a traditional approach in studying a language (prescriptive approach) in its insistence on the systematic study of authentic examples of language in use (descriptive approach).A “corpus” is a large body of machine-readable structurally collected naturally occurring linguistic data, either written texts or a transcription of recorded speech, which can be used as a starting-point of linguistic description or as a means of verifying hypotheses about a language. In the past decade, interest has grown tremendously in the use of language corpora for language education. The ways in which corpora have been employed in language pedago
... Show MoreThe necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show More