Preferred Language
Articles
/
jperc-418
Standards and quality controls for information technology applications to serve the Holy Quran
...Show More Authors

the research goal is preparing a list of standard criteria and quality controls for information technology applications to serve the Holy Quran.

To achieve this goal, the researcher has built a list of criteria according to the following steps:

First - identify the key areas covered by the whole list which are:

1 – Standards of system building and implementing with the operating screens.

2 – Standards of display forms including audio and video presentation.

3 – Standards which are related to the program philosophy.

4 - Standards which are related to the program objectives.

5 - Standards which are related to the program content.

6 - Standards which are related to sources and learning strategies.
7 - Standards which are related to the program educational activities.

8 - Standards which are associated with the amending and immediate feedback.
9 - Standards which are associated to the learners.
10 - Standards which are related to the methods of interaction between the learner and the program.

11 - Standards which are related to technical aspects.

12 - Standards which are related to the administrative aspects of the production.

Secondly - the formulating of items: The researcher formulated items standard according to the areas they represent, and organized them in the form of a closed questionnaire which were in their first form like (17, 22, 18, 27, 33, 12, 15, 21, 23, 14, 19, 11) items. There items were arranged respectively according to their areas to become (232).

       And the resolution was presented to a group of educational arbitrators and specialists in technology, curriculum, teaching methods, educational technology, measurement and evaluation in Iraqi universities to determine the validity of each item and its suitability according its area. The researcher used three choices for each item (appropriate, inappropriate, need to be modified), and asked them to propose other additional items if it is required. The researcher has shown the experts that the arbitration process will be achieved according to the Delphi method of all three rounds to reach the highest level of scientific accuracy.

           The resolution has been processed by calculating the weighted average of each item in addition to the weight percentile according to the Fisher equation. All the items have an average above the value and a high weighted percentage in general. The items were re-ordered depending on the strength of each item and the value of Centennial weight. The expert mentioned observations and suggestions to amending item(s) or dissociate some of the items into two items. In addition to integrate some other items and delete others bringing the number of items to (210).

             Then the researcher transfer list of criteria to card calendar specific measured each item weight listed on the ladder graded four (excellent, very good, good, poor) were given weights following (0, 1, 2, 3) to evaluate the quality control standards for IT applications programmed To serve the Holy Quran.

The researcher codified items card in order to make sure its Validity to the attention of a number of arbitrators specialists in the field of technology and curriculum and teaching methods and educational technology and measurement and evaluation to express their point of view about the clarity of each item and whether they are true in the measure placed for him, has expressed Important Notes and the value of satisfied researcher by and conducted against which the necessary adjustments, bringing the number of items observation card (204) item have been calculated researcher Reliability of the card across individuals using the method of Cooper to calculate the coefficient of agreement between the observers and that counts the number of times the agreement and the number of times the difference between the observers, it is clear that all transactions fortitude to analyze researcher with the observed first , The researcher observed with the second, and first observed with the second Notably, a high rank as follows (84.8%, 86.9%, 89.7%), and this means that the analysis tool was a high level of consistency, which gives an indication of the possibility of using the tool.

       The researcher has developed some recommendations and a number of proposals to complement the current study.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Audio Hiding in Color Image Using SLT Schemes
...Show More Authors

As usage of internet grows in different applications around the world, many techniques were developed to guard an important data against from illegal access and modification from unauthorized users by embedding this data into visual media called host media. Audio hiding in an image is a challenge because of the large size of the audio signal. Some previous methods have been presented to reduce the data of the audio signal before embedding it in the cover image, however, these methods was at the cost of reducing the quality of the audio signal. In this paper, a Slantlet transform (SLT) based method is applied to obtain better performance in terms of audio quality. In addition, the data hiding scheme in the cover color image has been imple

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Chaos, Solitons & Fractals
Modeling and analysis of an <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" altimg="si7.svg"><mml:mrow><mml:mi>S</mml:mi><mml:msub><mml:mi>I</mml:mi><mml:mn>1</mml:mn></mml:msub><mml:msub><mml:mi>I</mml:mi><mml:mn>2</mml:mn></mml:msub><mml:mi>R</mml:mi></mml:mrow></mml:math> epidemic model with nonlinear incidence and general recovery functions of <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" altimg="si8.svg"><mml:msub><mml:mi>I</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math>
...Show More Authors

View Publication
Scopus (15)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Mon May 20 2024
Journal Name
Iraqi Journal Of Applied Physics
Effect of Thermal Neutron Radiation Dose on Density of Local and Extended Energy States in Se<inf>55</inf>S<inf>20</inf>Sb<inf>15</inf>Sn<inf>10</inf> Alloy
...Show More Authors

Four samples of the Se55S20Sb15Sn10 alloy were prepared using the melting point method. Samples B, C and D were irradiated with (6.04×1010, 12.08×1010 and 18.12×1010 (n.cm-2s -1 ) of thermal neutron beam from a neutron source (241Am-9Be) respectively, while sample A was left not irradiated. The electrical properties were assessed both before and after the radiation. All irradiated and non-irradiated samples show three conduction mechanisms, at low temperatures, electrical conductivity is achieved by electron hopping between local states near the Fermi level. At intermediate temperatures, conduction occurs by the jumping of electrons between local states at band tails. At high temperatures, electrons transfer between extended stat

... Show More
View Publication Preview PDF
Scopus (1)
Scopus
Publication Date
Sun Feb 23 2025
Journal Name
Al–bahith Al–a'alami
Qualitative Curricula in Social Sciences: A Crisis of Philosophy or Techniques
...Show More Authors

The general crisis of research methods in the social sciences
Research methodology: philosophy and techniques, founded by philosophers and applied by scientists, and no accurate application of techniques except with a deep understanding of philosophy, as a prerequisite. This fact is almost completely absent from the Iraqi and Arab academic mentality. This constituted one of the dimensions of the double crisis - theoretical and applied - of research methods in the social sciences. As first, there is no philosophy of science, neither as an independent material nor as an introductory subject, but not even an oral confirmation. Secondly, the advancement of quantitative research methods are presented without a background philosophy, as sol

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 17 2022
Journal Name
Applied Sciences
Predicting Fruit’s Sweetness Using Artificial Intelligence—Case Study: Orange
...Show More Authors

The manual classification of oranges according to their ripeness or flavor takes a long time; furthermore, the classification of ripeness or sweetness by the intensity of the fruit’s color is not uniform between fruit varieties. Sweetness and color are important factors in evaluating the fruits, the fruit’s color may affect the perception of its sweetness. This article aims to study the possibility of predicting the sweetness of orange fruits based on artificial intelligence technology by studying the relationship between the RGB values of orange fruits and the sweetness of those fruits by using the Orange data mining tool. The experiment has applied machine learning algorithms to an orange fruit image dataset and performed a co

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Advances In Materials Physics And Chemistry
The Role of Cooling Condition on the Superconducting Properties of Tl&amp;lt;sub&amp;gt;2-x&amp;lt;/sub&amp;gt;Hg&amp;lt;sub&amp;gt;x&amp;lt;/sub&amp;gt;Sr&amp;lt;sub&amp;gt;2&amp;lt;/sub&amp;gt;Ca&amp;lt;sub&amp;gt;2&amp;lt;/sub&amp;gt;Cu&amp;lt;sub&amp;gt;3&amp;lt;/sub&amp;gt;O&amp;lt;sub&amp;gt;10+δ&amp;lt;/sub&amp;gt; System
...Show More Authors

View Publication
Crossref
Publication Date
Fri Sep 03 2010
Journal Name
Journal Of The College Of Education For Women
Analysis of Grammatical Forms and Semantic Functions of Hedging in Political Discourse: American Presidential Debate: تحلیل نماذج نحویة ذات وظائف دلالیة مستعملة في الخطاب السیاسي بوصفھ اسلوباً تحوطیاً: المناظرة الرئاسیة الاولى في الانتخابات الامریكیة
...Show More Authors

Hedging is a linguistic avoidance of full commitment or precision. It is the use of a vague language. The main objectives of this study are to

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Synthesis, Theoretical Study, and Biological Evaluation of Some Metal Ions with Ligand "Methyl -6-[2-(4-Hydroxyphenyl) -2-((1-Phenylethylidene) Amino) Acetamido] -2,2-Dimethyl-5—Oxo-1-Thia-4-Azabicyclo [3.2.0] Heptane-3-Carboxyylate
...Show More Authors

Schiff base (methyl 6-(2- (4-hydroxyphenyl) -2- (1-phenyl ethyl ideneamino) acetamido) -3, 3-dimethyl-7-oxo-4-thia-1-azabicyclo[3.2.0] heptane-2-carboxylate)Co(II), Ni(II), Cu (II), Zn (II), and Hg(II)] ions were employed to make certain complexes. Metal analysis M percent, elemental chemical analysis (C.H.N.S), and other standard physico-chemical methods were used. Magnetic susceptibility, conductometric measurements, FT-IR and UV-visible Spectra were used to identified. Theoretical treatment of the generated complexes in the gas phase was performed using the (hyperchem-8.07) program for molecular mechanics and semi-empirical computations. The (PM3) approach was used to determine the heat of formation (ΔH˚f), binding energy (ΔEb), an

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Blind Color Image Steganography in Spatial Domain
...Show More Authors

WA Shukur, FA Abdullatif, Ibn Al-Haitham Journal For Pure and Applied Sciences, 2011 With wide spread of internet, and increase the price of information, steganography become very important to communication. Over many years used different types of digital cover to hide information as a cover channel, image from important digital cover used in steganography because widely use in internet without suspicious.

View Publication