The present research aims to design an electronic system based on cloud computing to develop electronic tasks for students of the University of Mosul. Achieving this goal required designing an electronic system that includes all theoretical information, applied procedures, instructions, orders for computer programs, and identifying its effectiveness in developing Electronic tasks for students of the University of Mosul. Accordingly, the researchers formulated three hypotheses related to the cognitive and performance aspects of the electronic tasks. To verify the research hypotheses, a sample of (91) students is intentionally chosen from the research community, represented by the students of the college of education for humanities and college of education for pure sciences. The researchers adopt the experimental design of one group. The sample has been taught through the electronic system according to study plans developed by the researcher. To measure the dependent variable, this requires formulating two instruments: the first is a test that measured the cognitive aspect of the electronic tasks that consisted of two questions, the first included (40) multiple-choices and the second is a matching and pairing type with ten items. The second instrument is a performance test for electronic tasks of (25) items that included (166) performance steps. The research experiment starts with the beginning of the first semester of the academic year (2020/2021). It began on Tuesday (5/1/2021) and lasts for (9) weeks approximately to be finished on Sunday (7/3/2021). The results revealed that there is a statistically significant difference at the level of significance (0.05) between the mean scores of the cognitive test for electronic tasks for the research sample in the pre and post applications in favor of the post-application. There is a statistically significant difference at the level of significance (0.05) between the mean scores of the performance test for electronic tasks for the research sample in the pre and post applications in favor of the post-application. Thus, the researcher came out with several recommendations and suggestions.
The aim of the research is to indicate the degree of arrangement of the tax branches discussed and the level of efficiency of their performance according to the dimensions approved in the tax diagnostic tool (TADAT). The checklist has been approved as a main tool in collecting data and information from the tax branches of the General Authority for Taxes and the number (8) branches represented by (Karrada , Karakh Center, Al-Rusafa, New Baghdad, Al-Dora, Karakh Al-Tafim, Al-Kadhimiya, Al-Bayaa), The statistical program (spss) was used to calculate the weighted arithmetic media, and we reached the research to a number of conclusions, the most important of which were: - Each of the subsections (Karkh Al-Ahram and Karrada) achieved an
... Show MoreDetermining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreVol. 6, Issue 1 (2025)
In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreThe pilgrimage takes place in several countries around the world. The pilgrimage includes the simultaneous movement of a huge crowd of pilgrims which leads to many challenges for the pilgrimage authorities to track, monitor, and manage the crowd to minimize the chance of overcrowding’s accidents. Therefore, there is a need for an efficient monitoring and tracking system for pilgrims. This paper proposes powerful pilgrims tracking and monitoring system based on three Internet of Things (IoT) technologies; namely: Radio Frequency Identification (RFID), ZigBee, and Internet Protocol version 6 (IPv6). In addition, it requires low-cost, low-power-consumption implementation. The proposed