Preferred Language
Articles
/
mxe8-40BVTCNdQwCZCtx
Study the Effect of Using Google Classroom on the Academic Performance Under the Covid19 Pandemic Using Data Mining Technique
...Show More Authors

— In light of the pandemic that has swept the world, the use of e-learning in educational institutions has become an urgent necessity for continued knowledge communication with students. Educational institutions can benefit from the free tools that Google provide and from these applications, Google classroom which is characterized by ease of use, but the efficiency of using Google classroom is affected by several variables not studied in previous studies Clearly, this study aimed to identify the use of Google classroom as a system for managing e-learning and the factors affecting the performance of students and lecturer. The data of this study were collected from 219 members of the faculty and students at the College of Administration and Economics at the University of Baghdad in Iraq and have reached Google classroom offers all the technologies wanted by students and lecturer but there is a positive correlation between lack of knowledge of technical matters and decrease in the use of Google classroom and online education and vice versa.

Scopus Crossref
View Publication
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Engineering
Water Movement through Soil under Drip Irrigation using Different Hydraulic Soil Models
...Show More Authors

Drip irrigation is one of the conservative irrigation techniques since it implies supplying water directly on the soil through the emitter; it can supply water and fertilizer directly into the root zone. An equation to estimate the wetted area in unsaturated soil is taking into calculating the water absorption by roots is simulated numerically using HYDRUS (2D/3D) software. In this paper, HYDRUS comprises analytical types of the estimate of different soil hydraulic properties. Used one soil type, sandy loam, with three types of crops; (corn, tomato, and sweet sorghum), different drip discharge, different initial soil moisture content was assumed, and different time durations. The relative error for the different hydrauli

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Nov 14 2025
Journal Name
Journal Of Physical Education
The Effect of Inclusion Style Using Electronic Device On Learning Front and Side Movement in Squash For Beginners Aged 13 – 15 Years Old
...Show More Authors

View Publication
Publication Date
Tue Dec 01 2015
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
STUDY ON THE EFFECT OF ROYAL JELLY OF BEES (APIS MELLIFERA) ON THE MORPHOLOGY AND SPERM FUNCTION PARAMETERS IN MICE (SWISS ALBINO)
...Show More Authors

    The objective of this study was to investigate the effect of Royal jelly RJ on morphology and motility of mice sperms. Sperms were collected from the cauda region of the  epididymis of each 10 mice from the treatment and control groups. Direct activation techniques and evaluation of sperm morphology were carried out. Dhino microscope was used for sperm measurement. The inspection was carried out in Salamatic laboratory for pathological analysis in 2015.The result revealed that all of the sperm function parameters registered significant activation  in the treatment group. There was a significant increase in both the percentage of the sperm motility grade A and the progressive motility (A+B) of the treatment gr

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Geological Journal
Evaluating Machine Learning Techniques for Carbonate Formation Permeability Prediction Using Well Log Data
...Show More Authors

Machine learning has a significant advantage for many difficulties in the oil and gas industry, especially when it comes to resolving complex challenges in reservoir characterization. Permeability is one of the most difficult petrophysical parameters to predict using conventional logging techniques. Clarifications of the work flow methodology are presented alongside comprehensive models in this study. The purpose of this study is to provide a more robust technique for predicting permeability; previous studies on the Bazirgan field have attempted to do so, but their estimates have been vague, and the methods they give are obsolete and do not make any concessions to the real or rigid in order to solve the permeability computation. To

... Show More
View Publication
Scopus (14)
Crossref (6)
Scopus Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Journal Of Engineering
Multi-Sites Multi-Variables Forecasting Model for Hydrological Data using Genetic Algorithm Modeling
...Show More Authors

A two time step stochastic multi-variables multi-sites hydrological data forecasting model was developed and verified using a case study. The philosophy of this model is to use the cross-variables correlations, cross-sites correlations and the two steps time lag correlations simultaneously, for estimating the parameters of the model which then are modified using the mutation process of the genetic algorithm optimization model. The objective function that to be minimized is the Akiake test value. The case study is of four variables and three sites. The variables are the monthly air temperature, humidity, precipitation, and evaporation; the sites are Sulaimania, Chwarta, and Penjwin, which are located north Iraq. The model performance was

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 28 2014
Journal Name
Journal Of Energy And Power Engineering
Comparison between Two Vertical Enclosures Filled With Porous Media under the Effect of Radiation and Magnetohydrodynamics
...Show More Authors

View Publication
Crossref
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Some Hormonal Changes in Women with Primary Hypothyroidism under the Effect of Thyroid Hormone Replacement Therapy
...Show More Authors

Hypothyroidism has been associated with disorders of glucose and insulin metabolism..The present study was designed to evaluate the possible change in some hormones (free testosterone, estradiol, prolactin, insulin), glucose and homeostasis model assessment of insulin resistance (HOMA-IR) in women with primary hypothyroidism under thyroid hormone replacement therapy .This cross-sectional study was carried on 62 hypothyroid patients׳  women and 22  healthy women as control group at the specialized center for endocrinology and diabetes, AL-Rasafa Directorate of  Health Baghdad, with age range(15-60 years), diagnosed as having primary hypothyroidism on thyroxine replacement therapy with duration not less than four months.

... Show More
View Publication Preview PDF
Crossref