The present research aims to design an electronic system based on cloud computing to develop electronic tasks for students of the University of Mosul. Achieving this goal required designing an electronic system that includes all theoretical information, applied procedures, instructions, orders for computer programs, and identifying its effectiveness in developing Electronic tasks for students of the University of Mosul. Accordingly, the researchers formulated three hypotheses related to the cognitive and performance aspects of the electronic tasks. To verify the research hypotheses, a sample of (91) students is intentionally chosen from the research community, represented by the students of the college of education for humanities and college of education for pure sciences. The researchers adopt the experimental design of one group. The sample has been taught through the electronic system according to study plans developed by the researcher. To measure the dependent variable, this requires formulating two instruments: the first is a test that measured the cognitive aspect of the electronic tasks that consisted of two questions, the first included (40) multiple-choices and the second is a matching and pairing type with ten items. The second instrument is a performance test for electronic tasks of (25) items that included (166) performance steps. The research experiment starts with the beginning of the first semester of the academic year (2020/2021). It began on Tuesday (5/1/2021) and lasts for (9) weeks approximately to be finished on Sunday (7/3/2021). The results revealed that there is a statistically significant difference at the level of significance (0.05) between the mean scores of the cognitive test for electronic tasks for the research sample in the pre and post applications in favor of the post-application. There is a statistically significant difference at the level of significance (0.05) between the mean scores of the performance test for electronic tasks for the research sample in the pre and post applications in favor of the post-application. Thus, the researcher came out with several recommendations and suggestions.
Abstract
The net profit reported in the annual financial statements of the companies listed in the financial markets, is considered one of the Sources of information relied upon by users of accounting information in making their investment decisions. At the same time be relied upon in calculating the bonus (Incentives) granted to management, therefore the management of companies to manipulate those numbers in order to increase those bonuses associated to earnings, This practices are called earnings management practices. the manipulation in the figures of earnings by management will mislead the users of financial statements who depend on reported earnings in their deci
... Show MoreThe research started from the basic objective of tracking the reality of organizational excellence in educational organizations on the basis of practical application. The research in its methodology was based on the examination of organizational excellence in the way of evaluating institutional performance. Tikrit University was selected as a case study to study the reality of application to the dimensions of organizational excellence in it, The results of the analysis for ten periods during the year and month. For the accuracy of the test and its averages, it was preferable to use the T test to determine the significance of the results compared to the basic criteria.
The research found that there is an o
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreHiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a
... Show MoreThe manufacturing industry in Iraq has faced, during the time stages, several obstacles that have had devastating effects on the Iraqi economy. These obstacles are represented by political events and wars that have led to the depletion of most human and material resources and the suspension of most vital industrial facilities from working, And the occurrence of this major deviation in the process of economic development, For the same reasons, the contributions of the manufacturing sector to the gross domestic product varied fluctuatingly, indicating instability in the growth rates of this sector, On the other hand, the supremacy of the belief that the dominance of oil resources as a main source for creating economic growth and achieving a h
... Show MoreAbstract The League of Arab States took many procedures against the Syrian political system, like suspended Syria's membership in the League of Arab States and sent a team of Arab observers headed by Dabi to discuss the situation there and issued some decisions and statements that called the Syrian regime to stop the use of violence and repression against the Syrian opposition.Through these steps, the Arab League has tried to help the Syrian parties to resolve the crisis. However, the role of the league in the Syrian crisis was characterized by weakness in general, and lack of seriousness, which contributed in the aggravation of the situation in Syria, and the intervention of major powers in the internal affairs of Syria.
The parameter and system reliability in stress-strength model are estimated in this paper when the system contains several parallel components that have strengths subjects to common stress in case when the stress and strengths follow Generalized Inverse Rayleigh distribution by using different Bayesian estimation methods. Monte Carlo simulation introduced to compare among the proposal methods based on the Mean squared Error criteria.