Preferred Language
Articles
/
khaV3osBVTCNdQwCv-Kx
The Importance of Using Metaverse Technology in Education from the Point of View of University Teachers
...Show More Authors

The study aims to demonstrate the significance of metaverse technology across various disciplines, academic degrees, scientific fields, and academic titles. It also aims to assess the level of knowledge and understanding of university teachers (research sample) regarding metaverse technology. Hence, the descriptive research methodology was based on the method of statistical survey in the sample. It involved a set of organized scientific steps to deduce data from the reality of the statistical sample and its nature in order to achieve the objectives of the study. In this study, a questionnaire was used as a tool to collect data from a random sample of approximately 121 teachers and instructors from the University of Baghdad. This approach helped the study draw important conclusions and make recommendations. Specifically, the study found the following: there is a need for a clear understanding of the importance of implementing metaverse technology in university education; teachers in scientific colleges are more aware of its importance compared to their counterparts in humanitarian colleges; there is a strong call for all universities, colleges, and academic institutions to prioritize the application of metaverse technology in university education; there should be the availability of all necessary supplies and devices; and there should be the creation of an appropriate environment for teachers to effectively use metaverse technology when teaching students.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Computer Networks
An improved multi-objective evolutionary algorithm for detecting communities in complex networks with graphlet measure
...Show More Authors

View Publication
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Sep 01 2016
Journal Name
Radiology Case Reports
Intralobar pulmonary sequestration in elderly woman: a rare case report with emphasis on imaging findings
...Show More Authors

View Publication
Scopus (7)
Crossref (10)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Aip Conference Proceedings
Highly-charged EDTA-2Na salt as a novel draw solution in pressure-retarded Osmosis process
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
A Proposed Algorithm for Encrypted Data Hiding in Video Stream Based on Frame Random Distribution
...Show More Authors

     The science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within avera

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun May 27 2018
Journal Name
Journal Of Advanced Transportation
Accident Management System Based on Vehicular Network for an Intelligent Transportation System in Urban Environments
...Show More Authors

As cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie

... Show More
View Publication Preview PDF
Scopus (37)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Sensors
WDARS: A Weighted Data Aggregation Routing Strategy with Minimum Link Cost in Event-Driven WSNs
...Show More Authors

Realizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost

... Show More
View Publication Preview PDF
Scopus (35)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Jan 30 2020
Journal Name
Telecommunication Systems
Nature-inspired optimization algorithms for community detection in complex networks: a review and future trends
...Show More Authors

View Publication
Scopus (26)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Fri Nov 24 2023
Journal Name
Iraqi Journal Of Science
Focal glial detection coincides with precedes amyloid plague formation in APPPS1 transgenic mice by PCR
...Show More Authors

The identification and sequencing of Amyloid Precursor Protien (APP) and presenilin (PS) opened the door for the engineering of transgenic mouse models to study pathogenic mechanisms of Alzheimer Disease (AD). The first successful mouse models over-expressed human APP with an Familiar AD (FAD) linked mutation in the brain. These mice exhibit Aß plaques, neuron loss, dystrophic neurites, inflammatory responses, learning impairments and deficits in synaptic transmission and/or long-term potentiation. The genotypes of all offspring of APP/PS1 mutant mice are analysed by Polymerise Chain Reactions. Generally there are two possibilities to analyse the DNA. The First, primers for APP or PS1 was used separately assuming that both genes are int

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of The College Of Languages (jcl)
Qur'anic rhetorical nuances in Persian literature: تاثيردقایق و لطایف بلاغی قرآن كريم در ادب فارسی
...Show More Authors

Abstract: Persian literature, after the spread of Islam in Pars, received a lot of influence from the subtle and rhetorical details of the Holy Quran. This effect is more in poetry than in prose because the weights of Persian poetry are closer to the melody of the Qur'an and its weights.The effectiveness of most of the prose works is only in the Quranic themes and words. Persian poetry that has benefited from various sciences of rhetoric, including semantics, eloquence and rhetoric. The degree and manner of influence of each of the didactic, lyrical, epic and travelogue literary types is different from the rhetorical points of the Quran. The instructions under educational literature have benefited the least from Quranic rhetoric. The max

... Show More
View Publication Preview PDF
Crossref