This article reviews a decade of research in transforming smartphones into smart measurement tools for science and engineering laboratories. High-precision sensors have been effectively utilized with specific mobile applications to measure physical parameters. Linear, rotational, and vibrational motions can be tracked and studied using built-in accelerometers, magnetometers, gyroscopes, proximity sensors, or ambient light sensors, depending on each experiment design. Water and sound waves were respectively captured for analysis by smartphone cameras and microphones. Various optics experiments were successfully demonstrated by replacing traditional lux meters with built-in ambient light sensors. These smartphone-based measurements have increasingly been incorporated into high school and university laboratories. Such modernized science and engineering experimentations also provide a ubiquitous learning environment during the pandemic period.
The importance of the current research lies in the importance of teaching competencies and the ability of the teacher to deal and success in his educational career. The research aimed to identify the degree of teaching competencies according to Hermann model of physical education teachers in Baghdad governorate. The descriptive method using the survey method was used on a randomly selected sample of 462 teachers and 314 school principals. After the completion of the survey, the Hermann scale forms were distributed to the teachers. The forms of the teaching competency scale were distributed to their school principals as the direct supervisors of the teachers' evaluation. After completing the survey, the results of each scale were classified
... Show MoreEdge computing is proved to be an effective solution for the Internet of Things (IoT)-based systems. Bringing the resources closer to the end devices has improved the performance of the networks and reduced the load on the cloud. On the other hand, edge computing has some constraints related to the amount of the resources available on the edge servers, which is considered to be limited as compared with the cloud. In this paper, we propose Software-Defined Networking (SDN)-based resources allocation and service placement system in the multi-edge networks that serve multiple IoT applications. In this system, the resources of the edge servers are monitored using the proposed Edge Server Application (ESA) to determine the state of the edge s
... Show MoreIn this paper we shall prepare an sacrificial solution for fuzzy differential algebraic equations of fractional order (FFDAEs) based on the Adomian decomposition method (ADM) which is proposed to solve (FFDAEs) . The blurriness will appear in the boundary conditions, to be fuzzy numbers. The solution of the proposed pattern of equations is studied in the form of a convergent series with readily computable components. Several examples are resolved as clarifications, the numerical outcomes are obvious that the followed approach is simple to perform and precise when utilized to (FFDAEs).
In this paper, suggested method as well as the conventional methods (probability
plot-(p.p.) for estimations of the two-parameters (shape and scale) of the Weibull
distribution had proposed and the estimators had been implemented for different
sample sizes small, medium, and large of size 20, 50, and 100 respectively by
simulation technique. The comparisons were carried out between different methods
and sample sizes. It was observed from the results that suggested method which
were performed for the first time (as far as we know), by using MSE indicator, the
comparisons between the studied and suggested methods can be summarized
through extremely asymptotic for indicator (MSE) results by generating random
error
In this paper the nuclear structure of some of Si-isotopes namely, 28,32,36,40Si have been studied by calculating the static ground state properties of these isotopes such as charge, proton, neutron and mass densities together with their associated rms radii, neutron skin thicknesses, binding energies, and charge form factors. In performing these investigations, the Skyrme-Hartree-Fock method has been used with different parameterizations; SkM*, S1, S3, SkM, and SkX. The effects of these different parameterizations on the above mentioned properties of the selected isotopes have also been studied so as to specify which of these parameterizations achieves the best agreement between calculated and experimental data. It can be ded
... Show MoreAs of late, humankind has experienced radiation issues either computerized tomography (CT) or X-rays. In this investigation, we endeavor to limit the effect of examination hardware. To do this the medical image is cropping (cut and zoom) then represented the vascular network as a graph such that each contraction as the vertices and the vessel represented as an edges, the area of the coagulation was processed already, in the current search the shortest distance to reach to the place of the blood vessel clot is computed
A Tonido cloud server provides a private cloud storage solution and synchronizes customers and employees with the required cloud services over the enterprise. Generally, access to any cloud services by users is via the Internet connection, which can face some problems, and then users may encounter in accessing these services due to a weak Internet connection or heavy load sometimes especially with live video streaming applications overcloud. In this work, flexible and inexpensive proposed accessing methods are submitted and implemented concerning real-time applications that enable users to access cloud services locally and regionally. Practically, to simulate our network connection, we proposed to use the Raspberry-pi3 m
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show More