The present research aims to design an electronic system based on cloud computing to develop electronic tasks for students of the University of Mosul. Achieving this goal required designing an electronic system that includes all theoretical information, applied procedures, instructions, orders for computer programs, and identifying its effectiveness in developing Electronic tasks for students of the University of Mosul. Accordingly, the researchers formulated three hypotheses related to the cognitive and performance aspects of the electronic tasks. To verify the research hypotheses, a sample of (91) students is intentionally chosen from the research community, represented by the students of the college of education for humanities and college of education for pure sciences. The researchers adopt the experimental design of one group. The sample has been taught through the electronic system according to study plans developed by the researcher. To measure the dependent variable, this requires formulating two instruments: the first is a test that measured the cognitive aspect of the electronic tasks that consisted of two questions, the first included (40) multiple-choices and the second is a matching and pairing type with ten items. The second instrument is a performance test for electronic tasks of (25) items that included (166) performance steps. The research experiment starts with the beginning of the first semester of the academic year (2020/2021). It began on Tuesday (5/1/2021) and lasts for (9) weeks approximately to be finished on Sunday (7/3/2021). The results revealed that there is a statistically significant difference at the level of significance (0.05) between the mean scores of the cognitive test for electronic tasks for the research sample in the pre and post applications in favor of the post-application. There is a statistically significant difference at the level of significance (0.05) between the mean scores of the performance test for electronic tasks for the research sample in the pre and post applications in favor of the post-application. Thus, the researcher came out with several recommendations and suggestions.
This paper presents an experimental and theoretical analysis to investigate the two-phase flow boiling heat transfer coefficient and pressure drop of the refrigerant R-134a in the evaporator test section of the refrigeration system under different operating conditions. The test conditions considered are, for heat flux (13.7-36.6) kW/m2, mass flux (52-105) kg/m2.s, vapor quality (0.2-1) and saturation temperature (-15 to -3.7) ˚C. Experiments were carried out using a test rig for a 310W capacity refrigeration system, which is designed and constructed in the current work. Investigating of the experimental results has revealed that, the enhancement in local heat trans
... Show MoreTwenty five samples out of sixty wound swabs taken from burn patients were identified as P. aeruginosabacteria by conventional methods. Antibiotics susceptibility tests were performed against thirteen antibiotics. P. aeruginosa samples were treated with 0.5 mg/ml of Safranin O solution then irradiated with 532nm Q-switched Nd:YAG laser at four energy densities (0.324, 0.704, 1.380, and 1.831 J/cm2) for different times of 5, 8 and 11 minutes with 5Hz repetition rate. The viability, susceptibility to antibiotic and production of pyocyanin were determined before and after irradiation. The results showed that the number of CFU/ml of P. aeruginosa decreased with increasing the dose of irradiation. Complete killing of cells was observed at 1.8
... Show MoreTrickle irrigation is a system for supplying filtered water and fertilizer directly into the soil and water and it is allowed to dissipate under low pressure in an exact predetermined pattern. An equation to estimate the wetted area of unsaturated soil with water uptake by roots is simulated numerically using the HYDRUS-2D/3D software. In this paper, two soil types, which were different in saturated hydraulic conductivity were used with two types of crops tomato and corn, different values of emitter discharge and initial volumetric soil moisture content were assumed. It was assumed that the water uptake by roots was presented as a continuous sink function and it was introduced into Richard's equation in the unsaturated z
... Show MoreModern automation robotics have replaced many human workers in industrial factories around the globe. The robotic arms are used for several manufacturing applications, and their responses required optimal control. In this paper, a robust approach of optimal position control for a DC motor in the robotic arm system is proposed. The general component of the automation system is first introduced. The mathematical model and the corresponding transfer functions of a DC motor in the robotic arm system are presented. The investigations of using DC motor in the robotic arm system without controller lead to poor system performance. Therefore, the analysis and design of a Proportional plus Integration plus Divertive (PID) controller is illustrated.
... Show MoreMesoporous silica (MPS) nanoparticle was prepared as carriers for drug delivery systems by sol–gel method from sodium silicate as inexpensive precursor of silica and Cocamidopropyl betaine (CABP) as template. The silica particles were characterized by SEM, TEM, AFM, XRD, and N2adsorption–desorption isotherms. The results show that the MPS particle in the nanorange (40-80 nm ) with average diameter equal to 62.15 nm has rods particle morphology, specific surface area is 1096.122 m2/g, pore volume 0.900 cm3/g, with average pore diameter 2.902 nm, which can serve as efficient carriers for drugs. The adsorption kinetic of Ciprofloxacin (CIP) drug was studied and the data were analyzed and found to match well with
... Show MoreObjective : The study was carried out to construct an initial assessment documentation tool for nursing
recording system in Coronary Care Unit.
Methodology : A descriptive, purposive sample of (65) nurses was selected from CCU of main
teaching hospitals (Al Karama, Al Kindy, Al Kadimia, Al Yarmmok, Baghdad teaching hospital, Ibn
Al Naffis hospital) and Ibn-Al betar hospital in Baghdad city from the 15th of April 2004 to the 15th of
April 2006.
The instrument was constructed and comprised of two sections: section one included the
nurses' demographic characteristic; section two was the initial assessment documentation tool that
contained (2) parts including: General information form and the initial assessment form.
Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreToday with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show More