We will provide a new method in this study that integrates two types of applications, namely Graph Theory and Conjugate Young Diagram, the idea of combining the graph and the Young diagram is presented by Ali And Mahmood, which is primarily based on the idea of the e-abacus diagram, the new method is called GCYD, it directly applies to the English letter section, which will be a two-layer coding. It makes it difficult to detect the word or sentence.
Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef
... Show MoreBackground: Friedreich ataxia (FRDA) is the most common form of inherited ataxia, comprising one-half of all hereditary ataxias with a carrier rate between 1 in 60 to 1 in 90 and with a disease prevalence of 1 per 29,000. It can occur in two forms the classic form or in association with a vitamin E dependent ataxia. The precise role of Vitamin E in the nervous system is unknown; An Oxidative attack is suspected to play a role in Ataxia with Vitamin E deficiency, as well as in Friedreich ataxia. Vitamin E is the major free-radical-trapping antioxidant.
Objective: Theobjectives of the study is to asses vitamin E level in patients with Friedreichs ataxia phenotype in Iraqi patients.
... Show More
This study aimed to examine the effects of electronic training to improve the skills of designing electronic courses for teachers of Arabic language in the colleges of education in Iraq. The descriptive approach is applied and the sample included 145 teachers of Arabic who were selected randomly from the colleges of education in Iraq. Moreover, the results reflected that e-training is effective in improving the skills related to designing online educational courses for teachers of Arabic in the colleges of education in Iraq. Besides, there was no difference between the mean of the respondents' responses to the total score of the tool on the role of electronic training to develop the skills related to electronic courses designing for teacher
... Show MoreVitamins are a type of essential and important nutrient in the human body. It also plays an essential role in the health and protection of the human body. They share physiological functions with many chemicals, and their deficiency or increase endangers human health. Therefore, it is required to evolve and use modern methods to estimate the concentration of vitamins, even if their concentration is very low, and these include the vitamin E group tocopherols, tocotrienols, isomers, esters, and derivatives. They disagree not in their ability as anti-cancer agents but rather in their physiological as well as chemical relations, unlike vitamin A and vitamin D. The richest source of vitamin E is vegetable oil. Vitamin E, classified as a vitami
... Show MoreAbstract
The study aims to examine the relationships between cognitive absorption and E-Learning readiness in the preparatory stage. The study sample consisted of (190) students who were chosen randomly. The Researcher has developed the cognitive absorption and E-Learning readiness scales. A correlational descriptive approach was adopted. The research revealed that there is a positive statistical relationship between cognitive absorption and eLearning readiness.
One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,
... Show MoreE-commerce is the most important result of information technology in this day and age, has resulted in the use of commercial transactions to changes in economic, social, and psychological, and produced a new type of shopping, jobs, and create new job opportunities, and changed the traditional work environment. The challenge currently facing economic units is how to transfer this technology and its integration within the community, especially after the massive developments that have occurred in the areas of commercial and congested markets units, the economic and the products and services the many and varied and intensified competition among these units to achieve a profit, leading to the emergence of e-commerce as on
... Show MoreOnline examination is an integral and vital component of online learning. Student authentication is going to be widely seen when one of these major challenges within the online assessment. This study aims to investigate potential threats to student authentication in the online examinations. Adopting cheating in E-learning in a university of Iraq brings essential security issues for e-exam . In this document, these analysts suggested a model making use of a quantitative research style to confirm the suggested aspects and create this relationship between these. The major elements that might impact universities to adopt cheating electronics were declared as Educational methods, Organizational methods, Teaching methods, Technical meth
... Show MoreAfter the software revolution in the last decades, the field of information technology had a tremendous evolution that made many organizations reach the best benefits from this evolution in technologies. The banking sector evolved their old system from ordinary system to the online system. The term E-banking appears to cover almost all bank operations such as money transactions, account management, instant reports, instant notifications. E-banking offers several advantages to clients, but this opens many challenges and motivates unauthorized parties to focus on creating methods and exploiting weaknesses to attack and steal critical information that belongs to the banking system or clients. Iraqi banks recently adopted E-banking se
... Show More