Technology plays a vital role in all walks of life, one of these is Education. Google Classroom is one of the educational tools that are free of cost and recently has gained popularity within a short period in many countries, including Iraq. The primary purpose of this study is to explore the Google Classroom use in EFL learners' composition writing. The sample of the study is EFL Second-year College students from the College of Science for Women /Computer Science Department, which consisted of (35) students who have implemented Google Classroom for at least one semester in their classroom. The students were asked to finish two uncompleted paragraphs that have the only main idea and write a suitable conclusion to each one. The results showed that Google Classroom is not an entirely effective application in developing student's achievements in composition writing, but it is useful.
The research dealt with the topic ' the aesthetics of design shape of interior spaces for the syndicate of physicians' as it reflects visions evolving to the level of tasting and positive interpretation for the space of work to be on a high design level.The research consisting of four chapters as follow; The first chapter examined the problem of the research contracted in the following question: Have the design shapes any role in achieving and showing the aesthetic side for the syndicate of physicians? so the goal of the research was showing the aesthetics of design shape of interior spaces for the syndicate of physicians, The chapter also included the objective spatial and temporal limits of research .Finally the terms were specified. T
... Show MoreThe present study utilised date palm fibre (DPF) waste residues to adsorb Congo red (CR) dye from aqueous solutions. The features of the adsorbent, such as its surface shape, pore size, and chemical properties, were assessed with X-ray diffraction (XRD), BET, Fourier-transform infrared (FTIR), X-ray fluorescence (XRF), and field emission scanning electron microscope (FESEM). The current study employed the batch system to investigate the ideal pH to adsorb the CR dye and found that acidic pH decolourised the dye best. Extending the dye-DPF waste mixing period at 25°C reportedly removed more dye. Consequently, the influence of the starting dye and DPF waste quantity on dye removal was explored in this study. At 5 g/L dye concentration, 48% d
... Show MoreAbstract
Asthma is a complex disease defined by chronic airway inflammation and airflow limitation causing variable respiratory symptoms which include shortness of breath (SOB), wheezing, chest tightness and cough. Asthma guidelines advocate adding a second long acting bronchodilator to medium doses of inhaled corticosteroids (ICS) rather using high doses of ICS alone to control moderate to severe persistent asthma. The aim of this study was to evaluate the clinical outcomes of three medication regimens indicated for Iraqi patients suffering from persistent asthma.
This study was interventional randomized clinical study conducted on a sample of adult Iraqi asthm
... Show MoreDocument source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreAchieving reliable operation under the influence of deep-submicrometer noise sources including crosstalk noise at low voltage operation is a major challenge for network on chip links. In this paper, we propose a coding scheme that simultaneously addresses crosstalk effects on signal delay and detects up to seven random errors through wire duplication and simple parity checks calculated over the rows and columns of the two-dimensional data. This high error detection capability enables the reduction of operating voltage on the wire leading to energy saving. The results show that the proposed scheme reduces the energy consumption up to 53% as compared to other schemes at iso-reliability performance despite the increase in the overhead number o
... Show More