The developments and transformations taking place in the era and the growth of knowledge economies and communication technology led this development to compel higher education institutions in Iraq to reconsider their objectives to keep pace with development. And one of the most important tools of development was the application of e-learning standards and its long-term impact on the performance of the educational institution. Performance auditing plays an important role in verifying the extent to which these institutions have implemented their activities and programs that auditing performance by adopting e-learning standards helps the institutions’ management by providing appropriate information on the extent to which they achieve their goals through efficient, effective and economical utilization of the available resources. E-learning standards. Based on the research problem represented in the absence of a program to audit the performance of structural capital in accordance with e-learning standards, which were circulated to all Iraqi universities as a result of the conditions imposed by the Corona pandemic, which obligated all Iraqi universities to apply, which was reflected in the performance of the college, the research sample. The research was built on the hypothesis that (the presence of a program to audit the performance of the structural capital in the college, the research sample, according to the standards of e-learning, is reflected in the performance in universities). Indicators included in e-learning standards.
Integration of laminar bubbling flow with heat transfer equations in a novel internal jacket airlift bioreactor using microbubbles technology was examined in the present study. The investigation was accomplished via Multiphysics modelling to calculate the gas holdup, velocity of liquid recirculation, mixing time and volume dead zone for hydrodynamic aspect. The temperature and internal energy were determined for heat transfer aspect.
The results showed that the concentration of microbubbles in the unsparged area is greater than the chance of large bubbles with no dead zones being observed in the proposed design. In addition the pressure, due to the recirculation velocity of liquid around the draft
... Show More<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In
... Show MoreKE Sharquie, MM Al-Waiz, AA Al-Nuaimy, Saudi medical journal, 2005 - Cited by 8
The design, synthesis, and characterization of a star shaped 2,4,6-tris-(4`-carboxyphenoxy)-1,3,5-triazine liquid crystalline with columnar discotic mesophase properties establish H-bond interactions with 3,5-dialkoxypyidine were reported. The structures of the synthesized compounds were actually determined by elementary analysis, and FT-IR, ¹HNMR, ¹³CNMR, and mass spectroscopy. The mesomorphic properties of these mesogens were examined using differential scanning calorimetry (DSC) and optical polarizing microscopy (OPM). The synthesized molecules exhibited enantiotropic hexagonal columnar liquid crystal, which depends for the H- bond complex in a 1:3 ratio.
The growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreThe goal of this article is to construct fibrewise w-compact (resp. locally w-compact) spaces. Some related results and properties of these concepts will be investigated. Furthermore, we investigate various relationships between these concepts and three classes of fibrewise w-separation axioms.