The communication inspiration formed an essential foundations for contribute the influence individuals and recipients, whether negatively or positively, through the messages that were published and presented in them with multiple themes and viewpoints that covered all parts of the world and all age groups; it is directed to children addressing the various stages of childhood, as it simulates many goals, including what is directed through the digital use of educational data in television production, as it is considered an intellectual and mental bag to deliver ideas and expressive and aesthetic connotations to children, where the songs and cartoons carrying data on education; within adjacent relations and in a mutual direction, both of them support each other to achieve meaning and awareness. So that, the foregoing, the researcher has taken to delving into the folds of this title and its axes in a group of horizons and depth in its contents in terms of content and form; also, the exposure to the system of educational values in education and the age groups of children, as well as a review of the digital use of educational data in children's television programs and the method of technical treatment of them; the research aims to study the subject in its aspects, and from this point of view, the researcher formulated the research problem to launch his study with the following question; what are the technical and digital uses and treatments of education data in television production, and since it aims to reveal the employment of digital employment of educational data in children’s television programmes, the approach was adopted for descriptive (content analysis) being more appropriate to achieve the goals and reach the desired results, among which lies the plurality of contents and educational values in the children’s television program from the production of data that contribute to the establishment of education through digital software to produce an expressive, semantic and aesthetic level.
In this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation) structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of these procedures and compare them using generated data.
Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreRecently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse
... Show MoreDrones are highly autonomous, remote‐controlled platforms capable of performing a variety of tasks in diverse environments. A digital twin (DT) is a virtual replica of a physical system. The integration of DT with drones gives the opportunity to manipulate the drone during a mission. In this paper, the architecture of DT is presented in order to explain how the physical environment can be represented. The techniques via which drones are collecting the necessary information for DT are compared as a next step to introduce the main methods that have been applied in DT progress by drones. The findings of this research indicated that the process of incorporating DTs into drones will result in the advanc
Electronic learning was used as a substitute method for learning during the COVID-19 pandemic to conduct scientific materials and perform student assessment; this study aimed to investigate academic staff opinions toward electronic education. A cross-sectional study with a web-based questionnaire distributed to academic staff in different medical colleges in Iraq. After de-identification, data were collected and analyzed with statistical software to determine the significance between variables. A total of 256 participants were enrolled in the study: 83% were not satisfied or neutral to online learning, 80% showed a poor benefit from delivery of the practical electronic knowledge and 25% for theoretical sessions with a significant difference
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreInformation systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of
... Show MoreEmotional competence, is relatively a new concept, stands for the ability of people to perceive their feelings and emotions, and sharing them with others. It also refers to capability in optimizing these feeling and emotions, and managing them over various situations. Thus, this study aims to examine the efficiency of counseling program in developing an emotional competence among intermediate school students in Baghdad city. The sample included group of female students at intermediate stage. The findings revealed none of experimental and control groups have statistically significant differences in pre-posttests of emotional competence efficiency.