The present research aims to design an electronic system based on cloud computing to develop electronic tasks for students of the University of Mosul. Achieving this goal required designing an electronic system that includes all theoretical information, applied procedures, instructions, orders for computer programs, and identifying its effectiveness in developing Electronic tasks for students of the University of Mosul. Accordingly, the researchers formulated three hypotheses related to the cognitive and performance aspects of the electronic tasks. To verify the research hypotheses, a sample of (91) students is intentionally chosen from the research community, represented by the students of the college of education for humanities and college of education for pure sciences. The researchers adopt the experimental design of one group. The sample has been taught through the electronic system according to study plans developed by the researcher. To measure the dependent variable, this requires formulating two instruments: the first is a test that measured the cognitive aspect of the electronic tasks that consisted of two questions, the first included (40) multiple-choices and the second is a matching and pairing type with ten items. The second instrument is a performance test for electronic tasks of (25) items that included (166) performance steps. The research experiment starts with the beginning of the first semester of the academic year (2020/2021). It began on Tuesday (5/1/2021) and lasts for (9) weeks approximately to be finished on Sunday (7/3/2021). The results revealed that there is a statistically significant difference at the level of significance (0.05) between the mean scores of the cognitive test for electronic tasks for the research sample in the pre and post applications in favor of the post-application. There is a statistically significant difference at the level of significance (0.05) between the mean scores of the performance test for electronic tasks for the research sample in the pre and post applications in favor of the post-application. Thus, the researcher came out with several recommendations and suggestions.
Most Internet of Vehicles (IoV) applications are delay-sensitive and require resources for data storage and tasks processing, which is very difficult to afford by vehicles. Such tasks are often offloaded to more powerful entities, like cloud and fog servers. Fog computing is decentralized infrastructure located between data source and cloud, supplies several benefits that make it a non-frivolous extension of the cloud. The high volume data which is generated by vehicles’ sensors and also the limited computation capabilities of vehicles have imposed several challenges on VANETs systems. Therefore, VANETs is integrated with fog computing to form a paradigm namely Vehicular Fog Computing (VFC) which provide low-latency services to mo
... Show MoreCognitive methods play the role of regulator of the human environment for its direct relationship with sensory stimuli and stimuli associated with the organization of information and ideas and their preparation for use in subsequent situations. These methods determine the characteristic or ideal way of individual personality in the differentiation and integration of attitudes or cognitive field to which he is exposed. Therefore, the research aimed at the level of psychological stress and its relation to some personal characteristics that show the personality of the artist or the students of art.
Current research aims to.
- Identifying the extent of psychological stress and its relation to the personal ch
Codes of red, green, and blue data (RGB) extracted from a lab-fabricated colorimeter device were used to build a proposed classifier with the objective of classifying colors of objects based on defined categories of fundamental colors. Primary, secondary, and tertiary colors namely red, green, orange, yellow, pink, purple, blue, brown, grey, white, and black, were employed in machine learning (ML) by applying an artificial neural network (ANN) algorithm using Python. The classifier, which was based on the ANN algorithm, required a definition of the mentioned eleven colors in the form of RGB codes in order to acquire the capability of classification. The software's capacity to forecast the color of the code that belongs to an ob
... Show MoreThe Contemporary Business Environment is Surrounded by many quick and continues variable and changes which has an effect on the economic units. These variables and changes like the high competition which need many tools to help them to continue and achieve The critical success. So to achieve this they have many competitive strategies like cost leadership strategy, differentiation strategy and focus strategy.
Budget is regarded one of main tools to execute objectives polices and programs of the economic units, beside show how the economic units had execute the available economic resources.
Activity based on budgeting is regarded one of the modern technique in the m
... Show MoreVarious theories on learning have been developed with increasing frequency in the last
few decades. In tandem with this, Multiple Intelligence theory appeared as a new approach to
education as well as an important theory in the field of language learning. Gardner explains
that all human beings have different intelligence fields and a potential to develop them. These
intelligences are (verbal-linguistic, logical-mathematical, visual-spatial, musical, bodilykinesthetic,
interpersonal, intrapersonal, naturalistic, and Existential).
This study aims at investigating Multiple Intelligences of Iraqi college EFL students. To
achieve the aims of the study, a questionnaire is adopted according to Birmingham model
which incl
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreDeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show More A representative sample of a thousand volunteer university students was screened for evidence of thalassemia minor.Complete blood counts using automated blood cell analysers and blood smears were examined. Patients having anemia, abnormal red cell indices or morphological features of thalassemia minor like hypochromia, microcytosis, target cells erythrocytosis and family history of thalassemia were then investigated for determination of HbA2 & HbF levels. Estimation of hemoglobin A2 was performed by micro-column chromatography while HbF was done using alkali denaturation. Seventy seven out of the thousand samples tested positive for thalassemia minor. They all showed a hemoglobin A
The university professor is the main theme in the educational process, then we must have prepared attention and study, it is the upper hand in achieving the objectives of education and a factor of development of society and its development factors that set it up and increase the efficiency of the duties of universities and development centers and through that evaluation is essential process and Zerorah to improve his performance, especially if they're the evaluation process from the standpoint of their students
research goals
The current research aims to identify:
1. identify the effectiveness of teaching the University of Tikrit from the standpoint of their students
2. to identify the differences in