E-learning seeks to create an interactive learning environment between the teacher and the learner through electronic media conveying in more than one direction, regardless of how the environment and its variables are identified. It also develops skills necessary to deal with technology in order to be able to take into account the individual differences between them and helps e-learning teacher and learner to achieve the goals set in advance and identify educational objectives in a clear manner. The research aims to identify e-learning in its benefits and management systems. It has three sections dealt with in the current research. Chapter II concentrates on the research Methodology, which consisted of three sections: The first sections: What is e-learning, its benefits, types, constraints and disadvantages, The second section: the aspects of difference between e-learning and traditional education, and the most important equipment. For the third section, it addressed the e-learning and the management systems. Chapter III presents conclusions, recommendations, and suggestions, which can be summarized as follows: E-learning is directly dependent on the use of ICTs, which means that teacher and learner must be familiar with these techniques for the success of the educational process. E-learning provides a great opportunity for many groups in the society, especially those groups missed opportunities for education regardless of the reasons, whether economic or social. For Recommendations: The need to encourage school administrations to adopt this type of education and encourage teachers to use it. The need to set up training courses for teachers to clarify the importance of e-learning, ICT and qualify them to deal with this technology.
Abstract: An unfavorable complication of root canal is vertical root fracture. The aim of present study is to evaluate the vertical root fracture of treated teeth filled with gutta percha and Resilon obturating material using different sealers. Forty mandibular premolars used in the study. Canals randomly divided into four groups (n=10). Group-A eugenol-based (Endofill) sealer with gutta percha; GroupB epoxy-amine (AH Plus) sealer with gutta percha; Group-C resin-based (Real Seal) sealer with Resilon; or Group-D epoxide-based (Perma Evolution) sealer with gutta percha. Roots mounted vertically in cold cure acrylic blocks and subjected to vertical loading with a crosshead speed of 1mm ̸min. The point at which fracture of the roots occurred
... Show MoreA reduced-order extended state observer (RESO) based a continuous sliding mode control (SMC) is proposed in this paper for the tracking problem of high order Brunovsky systems with the existence of external perturbations and system uncertainties. For this purpose, a composite control is constituted by two consecutive steps. First, the reduced-order ESO (RESO) technique is designed to estimate unknown system states and total disturbance without estimating an available state. Second, the continuous SMC law is designed based on the estimations supplied by the RESO estimator in order to govern the nominal system part. More importantly, the robustness performance is well achieved by compensating not only the lumped disturbance, but also its esti
... Show MoreIn this work a model of a source generating truly random quadrature phase shift keying (QPSK) signal constellation required for quantum key distribution (QKD) system based on BB84 protocol using phase coding is implemented by using the software package OPTISYSTEM9. The randomness of the sequence generated is achieved by building an optical setup based on a weak laser source, beam splitters and single-photon avalanche photodiodes operating in Geiger mode. The random string obtained from the optical setup is used to generate the quadrature phase shift keying signal constellation required for phase coding in quantum key distribution system based on BB84 protocol with a bit rate of 2GHz/s.
The research entitled: (The Constructive Mutation of installation Systems in the Artworks of the artist Ali Al-Najar) has dealt with the concept of Mutation and its systematizations in installation in the artworks of (Ali Al-Najjar).
The research has four chapters: The first Chapter deals with the methodological framework represented by the basic problem of the research, that is concerned with the constructive mutation of installation systems.
The research aims at finding out the constructive mutation of installation systems in the artwork of ( Ali al-Najar). The research is limited by analyzing visual samples of (Ali Al-Najjar) artworks betwen (1967-1991)
The second chapter deals with the theoretical framework, it has five s
In this paper, a new third kind Chebyshev wavelets operational matrix of derivative is presented, then the operational matrix of derivative is applied for solving optimal control problems using, third kind Chebyshev wavelets expansions. The proposed method consists of reducing the linear system of optimal control problem into a system of algebraic equations, by expanding the state variables, as a series in terms of third kind Chebyshev wavelets with unknown coefficients. Example to illustrate the effectiveness of the method has been presented.
A design for a photovoltaic-thermal (PVT) assembly with a water-cooled heat sink was planned, constructed, and experimentally evaluated in the climatic conditions of the southern region of Iraq during the summertime. The water-cooled heat sink was applied to thermally manage the PV cells, in order to boost the electrical output of the PVT system. A set of temperature sensors was installed to monitor the water intake, exit, and cell temperatures. The climatic parameters including the wind velocity, atmospheric pressure, and solar irradiation were also monitored on a daily basis. The effects of solar irradiation on the average PV temperature, electrical power, and overall electrical-thermal efficiency were investigated. The findings i
... Show MoreFuture generations of wireless communications systems are expected to evolve toward allowing massive ubiquitous connectivity and achieving ultra-reliable and low-latency communications (URLLC) with extremely high data rates. Massive multiple-input multiple-output (m-MIMO) is a crucial transmission technique to fulfill the demands of high data rates in the upcoming wireless systems. However, obtaining a downlink (DL) training sequence (TS) that is feasible for fast channel estimation, i.e., meeting the low-latency communications required by future generations of wireless systems, in m-MIMO with frequency-division-duplex (FDD) when users have different channel correlations is very challenging. Therefore, a low-complexity solution for
... Show MoreThe research aimed at identifying the effect of the think, pair, and share strategy by using educational movies on learning jumping opened legs and closed legs skills on vault in artistic gymnastics for women. It also aimed at identifying the group that learned better the skills understudy. The researcher used the experimental method on second-grade College of Physical Education and Sport Sciences female students. Twelve female students were selected from each of the two sections to form the subjects of the study. The main program was applied for eight weeks with one learning session per week. The data was collected and treated using SPSS to conclude that the think, pair, and share strategy and the traditional program have positive effects
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show More