Technology plays a vital role in all walks of life, one of these is Education. Google Classroom is one of the educational tools that are free of cost and recently has gained popularity within a short period in many countries, including Iraq. The primary purpose of this study is to explore the Google Classroom use in EFL learners' composition writing. The sample of the study is EFL Second-year College students from the College of Science for Women /Computer Science Department, which consisted of (35) students who have implemented Google Classroom for at least one semester in their classroom. The students were asked to finish two uncompleted paragraphs that have the only main idea and write a suitable conclusion to each one. The results showed that Google Classroom is not an entirely effective application in developing student's achievements in composition writing, but it is useful.
The current study tackles how slavery and racial segregation, which have obviously made an enormous impact in the United States of America for many years, can be defeated through optimism. The study opens with an introduction that clarifies some background about Langston Hughes as a poet who writes against slavery and oppression done to the American Blacks during an era which was known for racial segregation in the United States of America. The poet sheds light , in his poetry, upon the role of African Americans in activating hope and optimism to get freedom which has been reached at the end. The first section of the study analyzes the meaning of slavery and segregation as reflected in some selected poems, showing the oppressive face of
... Show MoreThe Zubair reservoir in the Abu-Amood field is considered a shaly sand reservoir in the south of Iraq. The geological model is created for identifying the facies, distributing the petrophysical properties and estimating the volume of hydrocarbon in place. When the data processing by Interactive Petrophysics (IP) software is completed and estimated the permeability reservoir by using the hydraulic unit method then, three main steps are applied to build the geological model, begins with creating a structural, facies and property models. five zones the reservoirs were divided (three reservoir units and two cap rocks) depending on the variation of petrophysical properties (porosity and permeability) that results from IP software interpr
... Show MoreIn this research, the use of natural materials like wool and cannabis as intermediate reinforcement for prosthetic limbs due to their comfort, affordability, and local availability was discussed. As part of this study on below-the-knee (BK) prosthetic sockets, two sets of samples were made using a vacuum method. These sets were made of natural fiber-reinforced polymer composites with lamination 80:20: group (Y) had 4 perlon, 1 wool 4 perlon, and group (G) had 4 perlon, 1 cannabis 4 perlon. The two groups were compared with a socket made of polypropylene. Tensile testing was used to determine the mechanical characteristics of the socket materials. The Y group has a yield stress of 17 MPs, an ultimate strength of 18.75 MPa, and an elastic
... Show MoreIn networking communication systems like vehicular ad hoc networks, the high vehicular mobility leads to rapid shifts in vehicle densities, incoherence in inter-vehicle communications, and challenges for routing algorithms. It is necessary that the routing algorithm avoids transmitting the pockets via segments where the network density is low and the scale of network disconnections is high as this could lead to packet loss, interruptions and increased communication overhead in route recovery. Hence, attention needs to be paid to both segment status and traffic. The aim of this paper is to present an intersection-based segment aware algorithm for geographic routing in vehicular ad hoc networks. This algorithm makes available the best route f
... Show MoreSoftware-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for quickly identifying and mitigating anomalies. To this end, this research employs various classification methods, including support vector machines (SVMs), K-nearest neighbors (KNNs), decision trees (DTs), multiple layer perceptron (MLP), and convolutional neural networks (CNNs), and compares their performance. CNN exhibits the highest train accuracy at 97.808%, yet the lowest prediction accuracy at 90.08%. In contrast, SVM demonstrates the highest prediction accuracy of 95.5%. As such, an
... Show MoreWith the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev
... Show MoreSolar activity monitoring is important in our life because of its direct or indirect influence on our life, not only on ionospheric communications. To study solar activity, researchers need measuring and monitoring instruments, these instruments are mostly expensive and are not available in all universities. In this paper, a very low frequency radio receiver had been designed and implemented with components available in most markets to support the researchers, college students, and radio astronomy amateurs with a minimum input voltage less than 100µV, an output voltage less than 135 m V with no distortion and an overall gain of 34dB. A comparison had been done between two circuit structures using a workbench software program and experim
... Show MoreThe necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show MoreIn this study, chemical oxidation was employed for the synthesis of polypyrrole (PPy) nanofiber. Furthermore, PPy has been subjected to treatment using nanoparticles of neodymium oxide (Nd2O3), which were produced and added in a certain ratio. The inquiry centered on the structural characteristics of the blend of polypyrrole and neodymium oxide after their combination. The investigation utilises X-ray diffraction (XRD), FTIR, and Field Emission Scanning Electron Microscopy (FE-SEM) for PPy, 10%, 30%, and 50% by volume of Nd2O3. According to the electrochemical tests, it has been noted that the nanocomposites exhibit a substantial amount of pseudocapacitive activity.