In the spreading of the Internet, mobile smart devices, and interactive websites such as YouTube, the educational video becomes more widespread and deliberative among users. The reasons for its spread are the prevalence of technologies, cheap cost, and easy to use. However, these products often lack to the distinction in video production. By following videos of an educational channel on YouTube, some comments found to discuss the lack of the content presented to motivate the learners, which lead to reduce the viewers of the videos. Therefore, there is an important decision to find general standards for the design and production of educational videos. A list of standards has been drawn up to help those interested in producing educational videos to stimulate learner motivation, after reviewing 65 documents related to the field of educational video design and multimedia. The list contained three main fields: educational, authentication, and technical. The educational field contained the following standards: (Work Title, Goals, Content Presentation, Content Elements, and Motivational Activities). While the authentication field contained the following standards: (Intellectual Rights and Personality Traits). Finally, the technical field contained the following standards: (Shooting Footage, Lighting, Sound, Texts, final product, and Time/Duration).
In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreEmotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show MoreTolerance and its impact on building society
This paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.
In this study the adsorption of cefixime on to selected Iraqi clay bentonite. The aim of this study is to search for selective active surface in adsorption of the drug and to act as physical antidotes in treatment of poisoning if the drug is taken in quantities higher than the recommended dosages. Quantitative estimation of the drug adsorption has been done by utilizing the technique of UV spectrophotometry in λmax (273) nm at different conditions of temperature (25, 37, 45) ˚C found the adsorption decrease with increase the temperature. Study of clay weight of bentonite (0.1-1.5) gm found the adsorption increase with increase of clay weight, study effect of pH (1.2, 3, 5, 7) on adsorption of bentonite found the optimum adsorption
... Show MoreIn this paper, we define some generalizations of topological group namely -topological group, -topological group and -topological group with illustrative examples. Also, we define grill topological group with respect to a grill. Later, we deliberate the quotient on generalizations of topological group in particular -topological group. Moreover, we model a robotic system which relays on the quotient of -topological group.
In this paper, the error distribution function is estimated for the single index model by the empirical distribution function and the kernel distribution function. Refined minimum average variance estimation (RMAVE) method is used for estimating single index model. We use simulation experiments to compare the two estimation methods for error distribution function with different sample sizes, the results show that the kernel distribution function is better than the empirical distribution function.
For the graph , the behavior associated with to the majority of the graphical properties of this graph is covered in this article. The reflection of the capabilities of on the Ly constructions is one of the key ideas addressed throughout this paper. For instance, by this technique we can comprehend the mechanism via which groups of relatively tiny structure are exist within Ly.