Preferred Language
Articles
/
mxe8-40BVTCNdQwCZCtx
Study the Effect of Using Google Classroom on the Academic Performance Under the Covid19 Pandemic Using Data Mining Technique
...Show More Authors

— In light of the pandemic that has swept the world, the use of e-learning in educational institutions has become an urgent necessity for continued knowledge communication with students. Educational institutions can benefit from the free tools that Google provide and from these applications, Google classroom which is characterized by ease of use, but the efficiency of using Google classroom is affected by several variables not studied in previous studies Clearly, this study aimed to identify the use of Google classroom as a system for managing e-learning and the factors affecting the performance of students and lecturer. The data of this study were collected from 219 members of the faculty and students at the College of Administration and Economics at the University of Baghdad in Iraq and have reached Google classroom offers all the technologies wanted by students and lecturer but there is a positive correlation between lack of knowledge of technical matters and decrease in the use of Google classroom and online education and vice versa.

Scopus Crossref
View Publication
Publication Date
Fri Jan 01 2016
Journal Name
Iraqi Journal Of Agricultural Sciences
Effect of extraction of sheep manure with warm water on the growth and nutrients content of tomato plants under cultivation of plastic houses
...Show More Authors

Scopus
Publication Date
Thu Mar 21 2019
Journal Name
Biochemical & Cellular Archives
EVALUATION OF THE POTASSIUM AVAILABILITY IN THE SALINE SOILS USING THE THERMODYNAMIC CRITERION
...Show More Authors

View Publication Preview PDF
Publication Date
Fri Jan 01 2010
Journal Name
Conference Proceedings
Assessing the accuracy of 'crowdsourced' data and its integration with official spatial data sets
...Show More Authors

Scopus (20)
Scopus
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Computing
Twitter Location-Based Data: Evaluating the Methods of Data Collection Provided by Twitter Api
...Show More Authors

Twitter data analysis is an emerging field of research that utilizes data collected from Twitter to address many issues such as disaster response, sentiment analysis, and demographic studies. The success of data analysis relies on collecting accurate and representative data of the studied group or phenomena to get the best results. Various twitter analysis applications rely on collecting the locations of the users sending the tweets, but this information is not always available. There are several attempts at estimating location based aspects of a tweet. However, there is a lack of attempts on investigating the data collection methods that are focused on location. In this paper, we investigate the two methods for obtaining location-based dat

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Plant Archives
STUDY OF THE EFFECT OF SPEED, DEPTH OF THE CULTIVATION AND THE NUMBER OF TIMES THE SPRING – LOADED CULTIVATOR PASSES ON SOME TECHNICAL PARAMETERS OF THE CULTIVATOR AND ON WEED CONTROL
...Show More Authors

Preview PDF
Publication Date
Fri Jan 15 2021
Journal Name
Plant Archives
STUDY OF THE EFFECT OF SPEED, DEPTH OF THE CULTIVATION AND THE NUMBER OF TIMES THE SPRING – LOADED CULTIVATOR PASSES ON SOME TECHNICAL PARAMETERS OF THE CULTIVATOR AND ON WEED CONTRO
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Wed Jun 07 2023
Journal Name
Journal Of Educational And Psychological Researches
The Extent of Academic Knowledge in the Colleges of Applied Sciences of the Areas of the National Learning Strategy 2040 in the Sultanate of Oman
...Show More Authors

The study aims to identify the extent the academics in colleges of applied sciences are familiar with the themes of the national strategy of education 2040 in the Sultanate of Oman. The researchers used the descriptive approach, as well as they adopted a questionnaire with five dimensions as a tool for data collection, which was applied to (120) academics. The results showed that the academics of the applied colleges' familiarity with the National Strategy for Education 2040 in the Sultanate of Oman is average. The study also found that there were no statistically significant differences in the academics estimates of the extent of the Colleges of Applied Sciences academics’ familiarity with the themes of the National Education 2040 Str

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus